Sciweavers

413 search results - page 53 / 83
» Personalization via friendsourcing
Sort
View
96
Voted
JKM
2007
161views more  JKM 2007»
15 years 12 days ago
A strategy-based ontology of knowledge management technologies
Purpose – The purpose of this paper is to distinguish and describe knowledge management (KM) technologies according to their support for strategy. Design/methodology/approach â€...
Andre Saito, Katsuhiro Umemoto, Mitsuru Ikeda
BMCBI
2004
149views more  BMCBI 2004»
15 years 11 days ago
MiCoViTo: a tool for gene-centric comparison and visualization of yeast transcriptome states
Background: Information obtained by DNA microarray technology gives a rough snapshot of the transcriptome state, i.e., the expression level of all the genes expressed in a cell po...
Gaëlle Lelandais, Philippe Marc, Pierre Vince...
MOBIHOC
2010
ACM
14 years 10 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
110
Voted
MOBIHOC
2010
ACM
14 years 10 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
SACMAT
2011
ACM
14 years 3 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...