Sciweavers

1998 search results - page 186 / 400
» Situated Control Rules
Sort
View
VLDB
2007
ACM
225views Database» more  VLDB 2007»
16 years 5 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
140
Voted
IROS
2007
IEEE
184views Robotics» more  IROS 2007»
15 years 11 months ago
Integration of emotional reactions on human facial expressions into the robot head MEXI
— Emotion recognition and adequate reactions are a crucial part of human communication and hence should also be considered for interactions between humans and robots. In this pap...
Natascha Esau, Lisa Kleinjohann, Bernd Kleinjohann
SASO
2008
IEEE
15 years 11 months ago
Self-Adaptive Dissemination of Data in Dynamic Sensor Networks
The distribution of data in large dynamic wireless sensor networks presents a difficult problem due to node mobility, link failures, and traffic congestion. In this paper, we pr...
David Dorsey, Bjorn Jay Carandang, Moshe Kam, Chri...
KES
2007
Springer
15 years 11 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 11 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer