Sciweavers

928 search results - page 74 / 186
» Safety management of complex technology
Sort
View
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
15 years 10 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...
CMG
2001
14 years 11 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski
JAIHC
2010
147views more  JAIHC 2010»
14 years 8 months ago
Agents and ambient intelligence: case studies
The significance that ambient intelligence (AmI) has acquired in recent years requires the development of innovative solutions. In this sense, the development of AmI-based systems...
Dante I. Tapia, Ajith Abraham, Juan M. Corchado, R...
ECWEB
2004
Springer
177views ECommerce» more  ECWEB 2004»
15 years 3 months ago
Analysis of Mobile Business Processes for the Design of Mobile Information Systems
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
André Köhler, Volker Gruhn
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...