Sciweavers

19936 search results - page 3524 / 3988
» Inductive process modeling
Sort
View
136
Voted
KES
2005
Springer
15 years 10 months ago
A Robust Approach for Improving Computational Efficiency of Order-Picking Problems
The new market forces have affected the operation of distribution centers (DCs) extremely. The DCs demand an increased productivity and a low cost in their daily operation. This pa...
Yu-Min Chiang, Shih-Hsin Chen, Kuo-Chang Wu
144
Voted
LOCA
2005
Springer
15 years 10 months ago
Mobile Context Inference Using Low-Cost Sensors
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user’s place and situational context. Speci...
Evan Welbourne, Jonathan Lester, Anthony LaMarca, ...
LOCA
2005
Springer
15 years 10 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
182
Voted
MIDDLEWARE
2005
Springer
15 years 10 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
168
Voted
PCI
2005
Springer
15 years 10 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
« Prev « First page 3524 / 3988 Last » Next »