Sciweavers

1397 search results - page 257 / 280
» Manufacturing Modeling using Process Nets with Resources
Sort
View
85
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 5 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
86
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems
— A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where...
Amir Hamed Mohsenian Rad, Vahid Shah-Mansouri, Vin...
81
Voted
ECOWS
2007
Springer
15 years 4 months ago
Nonblocking Scheduling for Web Service Transactions
For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness o...
Mohammad Alrifai, Wolf-Tilo Balke, Peter Dolog, Wo...
EMSOFT
2007
Springer
15 years 4 months ago
Scheduling multiple independent hard-real-time jobs on a heterogeneous multiprocessor
This paper proposes a scheduling strategy and an automatic scheduling flow that enable the simultaneous execution of multiple hard-real-time dataflow jobs. Each job has its own ...
Orlando Moreira, Frederico Valente, Marco Bekooij
HICSS
2006
IEEE
93views Biometrics» more  HICSS 2006»
15 years 4 months ago
Presenting the Past: A Framework for Facilitating the Externalization and Articulation of User Activities in Desktop Environment
Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part ...
Kimmo Wideroos, Samuli Pekkola