Sciweavers

789 search results - page 55 / 158
» Pushing using Compliance
Sort
View
TITS
2002
148views more  TITS 2002»
15 years 1 months ago
A self-describing data transfer model for ITS applications
The wide variety of remote sensors used in Intelligent Transportation Systems (ITS) applications (loops, probe vehicles, radar, cameras, etc.) has created a need for general method...
Daniel J. Dailey, Stuart Maclean, Fritz W. Cathey,...
IPAW
2010
14 years 11 months ago
Provenance of Decisions in Emergency Response Environments
Mitigating the devastating ramifications of major disasters requires emergency workers to respond in a maximally efficient way. Information systems can improve their efficiency by ...
Iman Naja, Luc Moreau, Alex Rogers
ICUMT
2009
14 years 11 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
JIKM
2011
101views more  JIKM 2011»
14 years 4 months ago
Automated Generation of Personal Data Reports from Relational Databases
Abstract. This paper presents a novel approach for extracting personal data and automatically generating Personal Data Reports (PDRs) from relational databases. Such PDRs can be us...
Georgios John Fakas, Ben Cawley, Zhi Cai
KESAMSTA
2007
Springer
15 years 7 months ago
Mobile Collaboration Framework for u-Healthcare Agent Services and Its Application Using PDAs
In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile c...
Chang-Won Jeong, Dong-Ho Kim, Su-Chong Joo