Sciweavers

3103 search results - page 529 / 621
» Managing Concern Interfaces
Sort
View
CRITICAL
2005
15 years 6 months ago
Comparing two approaches to context: realism and constructivism
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, hav...
Antti Oulasvirta, Sakari Tamminen, Kristina Hö...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 6 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 6 months ago
Constraint Refinement for Online Verifiable Cross-Layer System Adaptation
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
DIMEA
2008
122views Multimedia» more  DIMEA 2008»
15 years 6 months ago
Multiplayer role games applied to problem based learning
The educational community is willing to approach the learning applications to the engaging and immersive formats of multimedia and video games as a way of increasing the motivatio...
Pilar Sancho, Pedro Pablo Gómez-Martí...
EKAW
2008
Springer
15 years 6 months ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...