Sciweavers

1700 search results - page 279 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
CHI
2008
ACM
15 years 10 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
IRI
2008
IEEE
15 years 4 months ago
FACT: A fusion architecture with contract templates for semantic and syntactic integration
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users s...
Rose F. Gamble, Robert Baird, Leigh Flagg, Melody ...
LOCA
2005
Springer
15 years 3 months ago
Mobile Context Inference Using Low-Cost Sensors
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user’s place and situational context. Speci...
Evan Welbourne, Jonathan Lester, Anthony LaMarca, ...
RT
2005
Springer
15 years 3 months ago
Real Illumination from Virtual Environments
We introduce a method for actively controlling the illumination in a room so that it is consistent with a virtual world. In combination with a high dynamic range display, the syst...
Abhijeet Ghosh, Matthew Trentacoste, Helge Seetzen...
IRI
2003
IEEE
15 years 3 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan