Sciweavers

489 search results - page 56 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
AVI
2008
15 years 2 months ago
Exploring blog archives with interactive visualization
Browsing a blog archive is currently not well supported. Users cannot gain an overview of a blog easily, nor do they receive adequate support for finding potentially interesting e...
Indratmo, Julita Vassileva, Carl Gutwin
IEPOL
2010
102views more  IEPOL 2010»
14 years 11 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
TMC
2012
13 years 2 months ago
Fast Data Collection in Tree-Based Wireless Sensor Networks
—We investigate the following fundamental question—how fast can information be collected from a wireless sensor network organized as tree? To address this, we explore and evalu...
Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar K...
101
Voted
AOSE
2007
Springer
15 years 6 months ago
Open Agent Systems???
Abstract. E-institutions are envisioned as facilities on the Internet for heterogeneous software agents to perform their interactions and thus forming truly open agent systems. We ...
Frank Dignum, Virginia Dignum, John Thangarajah, L...
SIGCSE
2006
ACM
147views Education» more  SIGCSE 2006»
15 years 6 months ago
Image understanding as a second course in AI: preparing students for research
This paper describes the development and structure of a second course in artificial intelligence that was developed to meet the needs of upper-division undergraduate and graduate ...
Roxanne L. Canosa