Sciweavers

653 search results - page 87 / 131
» Specifying Business Requirements through Interaction Design
Sort
View
ICMB
2006
IEEE
138views Business» more  ICMB 2006»
15 years 5 months ago
me-Commerce: An Infrastructure for Personal Predictive Mobile Commerce
Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mo...
Andreas Komninos, Peter Barrie, Julian Newman, Stu...
ICRA
2005
IEEE
118views Robotics» more  ICRA 2005»
15 years 4 months ago
Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages
— This paper presents an approach for haptic rendering of topological constraints to users operating serial virtual linkages. In the proposed approach, a haptic device controller...
Daniela Constantinescu, S. E. Salcudean, Elizabeth...
CSFW
2011
IEEE
13 years 11 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ICSOC
2004
Springer
15 years 4 months ago
Toward autonomic web services trust and selection
Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, curr...
E. Michael Maximilien, Munindar P. Singh
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
16 years 15 days ago
Network-Aware Operator Placement for Stream-Processing Systems
To use their pool of resources efficiently, distributed stream-processing systems push query operators to nodes within the network. Currently, these operators, ranging from simple...
Peter R. Pietzuch, Jonathan Ledlie, Jeffrey Shneid...