Sciweavers

2363 search results - page 430 / 473
» How Secure is RFID
Sort
View
ISTAR
2008
15 years 5 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
MIE
2008
194views Healthcare» more  MIE 2008»
15 years 5 months ago
Developing a Shared Electronic Health Record for Patients and Clinicians
Improving Shared Decision Making (SDM) and patient-provider communication, and providing all citizens with equal access to health information has become a high priority health poli...
Cornelia M. Ruland, Haakon Bryhni, Roar Andersen, ...
MKWI
2008
160views Business» more  MKWI 2008»
15 years 5 months ago
Architectural Design of Flexible Process Management Technology
: To provide effective support, process-aware information systems (PAIS) must not freeze existing business processes. Instead they should enable authorized users to deviate on-the-...
Manfred Reichert, Peter Dadam, Martin Jurisch, Ulr...
SERVICES
2008
85views more  SERVICES 2008»
15 years 5 months ago
Early Aspects for Non-Functional Properties in Service Oriented Business Processes
In Service Oriented Architecture, each application is often designed with a set of reusable services and a business process. In order to retain the reusability of services, it is ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
139
Voted
AAAI
2004
15 years 5 months ago
Visibility-Based Pursuit-Evasion with Limited Field of View
We study a form of the pursuit-evasion problem, in which one or more searchers must move through a given environment so as to guarantee detection of any and all evaders, which can...
Brian P. Gerkey, Sebastian Thrun, Geoffrey J. Gord...