Sciweavers

9095 search results - page 1663 / 1819
» Service RT Systems
Sort
View
UIST
1995
ACM
15 years 8 months ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
WSC
2007
15 years 6 months ago
Code analysis and CS-XML
The automated analysis of model specifications is an area that historically receives little attention in the simulation research community but which can offer significant bene...
Kara A. Olson, C. Michael Overstreet, E. Joseph De...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 6 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
BPM
2008
Springer
207views Business» more  BPM 2008»
15 years 6 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
MDM
2010
Springer
194views Communications» more  MDM 2010»
15 years 6 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
« Prev « First page 1663 / 1819 Last » Next »