Sciweavers

477 search results - page 53 / 96
» A Pervasive Computing System for the Operating Room of the F...
Sort
View
ESORICS
2004
Springer
14 years 2 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
MIDDLEWARE
2004
Springer
14 years 2 months ago
Research directions in reflective middleware: the Lancaster experience
In this paper, we survey three generation of reflective middleware research carried out at Lancaster University, present experiences gained from this research, and highlight a num...
Gordon S. Blair, Geoff Coulson, Paul Grace
DFG
2009
Springer
14 years 3 months ago
Iterative Compression for Exactly Solving NP-Hard Minimization Problems
Abstract. We survey the conceptual framework and several applications of the iterative compression technique introduced in 2004 by Reed, Smith, and Vetta. This technique has proven...
Jiong Guo, Hannes Moser, Rolf Niedermeier
EDOC
2008
IEEE
14 years 3 months ago
Service-Oriented Enterprise Architectures: Evolution of Concepts and Methods
This paper depicts the evolution of enterprise architectures to their today often used service-oriented form and presents a state-of-the-art development process for this kind of a...
Gregor Engels, Martin Assmann
EDOC
2006
IEEE
14 years 2 months ago
Translating business contract into compliant business processes
This paper presents an approach for translating legalese expression of business contracts into candidate business activities and processes while ensuring their compliance with con...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...