Sciweavers

224 search results - page 36 / 45
» A Formal Treatment of Context-Awareness
Sort
View
DCOSS
2007
Springer
13 years 11 months ago
Efficient Computation of Minimum Exposure Paths in a Sensor Network Field
The exposure of a path p is a measure of the likelihood that an object traveling along p is detected by a network of sensors and it is formally defined as an integral over all poin...
Hristo Djidjev
ACSD
2004
IEEE
125views Hardware» more  ACSD 2004»
13 years 11 months ago
Comparison of Methods for Supervisory Control and Submodule Construction
Over the last 25 years, methods for supervisory control of discrete event systems and methods for submodule construction based on state machine specifications have been developed ...
Gregor von Bochmann, Bassel Daou
INCDM
2010
Springer
204views Data Mining» more  INCDM 2010»
13 years 10 months ago
Combining Business Process and Data Discovery Techniques for Analyzing and Improving Integrated Care Pathways
Hospitals increasingly use process models for structuring their care processes. Activities performed to patients are logged to a database but these data are rarely used for managin...
Jonas Poelmans, Guido Dedene, Gerda Verheyden, Her...
COMPSAC
2005
IEEE
13 years 9 months ago
Efficiently Managing Security Concerns in Component Based System Design
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
ACISP
2010
Springer
13 years 9 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila