Sciweavers

3544 search results - page 510 / 709
» Information Security in Open Systems
Sort
View
WOA
2007
15 years 20 days ago
Expectations driven approach for Situated, Goal-directed Agents
Abstract— Situated agents engaged in open systems continually face with external events requiring adequate services and behavioral responses. In these conditions agents should be...
Michele Piunti, Cristiano Castelfranchi, Rino Falc...
CLEIEJ
2008
88views more  CLEIEJ 2008»
14 years 11 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
PSYCHNOLOGY
2006
102views more  PSYCHNOLOGY 2006»
14 years 11 months ago
Radiology Informatics and Work Flow Redesign
The transformation from film-based to filmless operations has become more and more challenging as medical imaging studies expand in size and complexity. To adapt to these changes ...
Guido Vaccari, Carlo Saccavini
IPAW
2010
14 years 8 months ago
Provenance of Software Development Processes
Abstract. "Why does the build fail currently?" - This and similar questions arise on a daily basis in software development processes (SDP). There is no easy way to answer...
Heinrich Wendel, Markus Kunde, Andreas Schreiber
TITB
2011
113views more  TITB 2011»
14 years 6 months ago
Intensive Care Window: Real-Time Monitoring and Analysis in the Intensive Care Environment
—This paper introduces a novel, open source software named Intensive Care Window, ICW. ICW enables communication with intensive care unit bedside installed medical devices over s...
Nikolas Stylianides, Marios D. Dikaiakos, K. Haral...