Sciweavers

897 search results - page 113 / 180
» Identity: How to name it, How to find it
Sort
View
ESWA
2011
245views Database» more  ESWA 2011»
14 years 8 months ago
APROMORE: An advanced process model repository
Business process models are becoming available in large numbers due to their popular use in many industrial applications such as enterprise and quality engineering projects. On th...
Marcello La Rosa, Hajo A. Reijers, Wil M. P. van d...
CORR
2012
Springer
205views Education» more  CORR 2012»
13 years 9 months ago
Check Your Data Freedom: A Taxonomy to Assess Life Science Database Openness
Molecular biology data are subject to terms of use that vary widely between databases and curating institutions. This research presents a taxonomy of contractual and technical res...
Mélanie Dulong de Rosnay
ICSE
2007
IEEE-ACM
16 years 1 months ago
OPIUM: Optimal Package Install/Uninstall Manager
Linux distributions often include package management tools such as apt-get in Debian or yum in RedHat. Using information about package dependencies and conflicts, such tools can d...
Chris Tucker, David Shuffelton, Ranjit Jhala, Sori...
CSCW
2010
ACM
15 years 10 months ago
Egalitarians at the gate: one-sided gatekeeping practices in social media
Although Wikipedia has increasingly attracted attention for its in-depth and timely coverage of breaking news stories, the social dynamics of how Wikipedia editors process breakin...
Brian Keegan, Darren Gergle
LCN
2006
IEEE
15 years 7 months ago
Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Ex
This paper examines how various carrier-sensing schemes affect the exposed-node (EN) and hidden-node (HN) phenomena. In the process, we identify a new carrier-sensing mechanism fo...
An Chan, Soung Chang Liew