Sciweavers

2363 search results - page 433 / 473
» How Secure is RFID
Sort
View
COMAD
2009
15 years 5 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
DLS
2008
264views Languages» more  DLS 2008»
15 years 5 months ago
Contextual values
Context-oriented programming proposes to treat execution context explicitly and to provide means for context-dependent adaptation at runtime. There are many mechanisms that can be...
Éric Tanter
EUROSSC
2008
Springer
15 years 5 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
AI
2008
Springer
15 years 4 months ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...
CCR
2008
122views more  CCR 2008»
15 years 4 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang