Sciweavers

1202 search results - page 202 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
ESWA
2006
123views more  ESWA 2006»
15 years 1 months ago
Design of a RFID case-based resource management system for warehouse operations
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...
IJSC
2008
95views more  IJSC 2008»
15 years 1 months ago
Beyond Information Silos - an Omnipresent Approach to Software Evolution
ifferent abstraction levels, resulting in isolated `information silos'. An increasing number of task-specific software tools aim to support developers, but this often results ...
Juergen Rilling, René Witte, Philipp Sch&uu...
COMCOM
2007
139views more  COMCOM 2007»
15 years 1 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin
JCST
2008
98views more  JCST 2008»
15 years 1 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
EJIS
2007
115views more  EJIS 2007»
15 years 1 months ago
Towards agent-oriented model-driven architecture
Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represen...
Liang Xiao 0002, Des Greer