Sciweavers

13822 search results - page 2709 / 2765
» Models in Knowledge Management
Sort
View
171
Voted
KIVS
2009
Springer
15 years 10 months ago
Abstract User Interfaces for Mobile Processes
User Interfaces for Mobile Processes Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian P. Kunze Distributed Systems and Information Systems, Computer Science Department, Universit...
Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian...
173
Voted
MIDDLEWARE
2009
Springer
15 years 10 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
147
Voted
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
111
Voted
PETRA
2009
ACM
15 years 10 months ago
A technological infrastructure design for a pediatric oncology network
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Aniello Murano
119
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
« Prev « First page 2709 / 2765 Last » Next »