Sciweavers

3103 search results - page 390 / 621
» Locating Features in Distributed Systems
Sort
View
152
Voted
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 10 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
166
Voted
INFSOF
2006
108views more  INFSOF 2006»
15 years 4 months ago
Reaching consensus: A moderated fuzzy web services discovery method
Web services are used for developing and integrating highly distributed and heterogeneous systems in different domains such as e-business, grid services, and e-government systems....
Chun-Lung Huang, Chi-Chun Lo, Kuo-Ming Chao, Muham...
RECSYS
2009
ACM
15 years 11 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
BTW
2005
Springer
142views Database» more  BTW 2005»
15 years 10 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
GPCE
2009
Springer
15 years 9 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss