Sciweavers

3077 search results - page 543 / 616
» Research issues
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
15 years 19 days ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
IIE
2007
125views more  IIE 2007»
15 years 17 days ago
Should LOGO Keep Going FORWARD 1?
LOGO has been evolving in incremental steps for 40 years. This has resulted in steady progress but some regions of the space of all programming languages for children cannot be re...
Ken Kahn
93
Voted
ICSE
2007
IEEE-ACM
16 years 22 days ago
Modeling in Software Engineering
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...
92
Voted
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
15 years 5 months ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
108
Voted
IWCMC
2010
ACM
15 years 2 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...