Sciweavers

1709 search results - page 326 / 342
» Integrating Information, Applications and Services on the We...
Sort
View
ATAL
2010
Springer
14 years 11 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
IJIEM
2010
126views more  IJIEM 2010»
14 years 7 months ago
E-Health readiness framework from Electronic Health Records perspective
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...
DKE
2011
260views Education» more  DKE 2011»
14 years 1 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
DMSN
2009
ACM
15 years 4 months ago
Message models and aggregation in knowledge based middleware for rich sensor systems
Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained “sensor networks” measuring simple...
Joseph B. Kopena, William C. Regli, Boon Thau Loo
ASWEC
2006
IEEE
15 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...