Sciweavers

2747 search results - page 273 / 550
» Network externalities in software systems
Sort
View
121
Voted
ATAL
2004
Springer
15 years 4 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
EUROMICRO
2009
IEEE
15 years 7 months ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
AUTONOMICS
2008
ACM
15 years 2 months ago
Tracking and tracing containers through distributed sensor middleware
In a container transport system, wireless sensor networks (WSNs) can be used for monitoring products while they are being transported. To be commercially interesting, these WSNs m...
Klaas Thoelen, Sam Michiels, Wouter Joosen
110
Voted
WWW
2003
ACM
16 years 1 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
92
Voted
EDBTW
2010
Springer
15 years 7 months ago
Biochemical network matching and composition
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
Martin Hugh Goodfellow, John Wilson, Ela Hunt