Sciweavers

792 search results - page 83 / 159
» A Proposal of the Person-centered Approach for Personal Task...
Sort
View
ACSAC
2004
IEEE
14 years 27 days ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
SOCASE
2009
Springer
14 years 3 months ago
Business Modeling via Commitments
Abstract. Existing computer science approaches to business modeling offer lowstractions such as data and control flows, which fail to capture the business intent underlying the in...
Pankaj R. Telang, Munindar P. Singh
GPCE
2009
Springer
14 years 1 months ago
A generative programming approach to developing pervasive computing systems
Developing pervasive computing applications is a difficult task because it requires to deal with a wide range of issues: heterogeneous devices, entity distribution, entity coordi...
Damien Cassou, Benjamin Bertran, Nicolas Loriant, ...
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
14 years 9 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
ISCA
2007
IEEE
174views Hardware» more  ISCA 2007»
14 years 3 months ago
An integrated hardware-software approach to flexible transactional memory
There has been considerable recent interest in the support of transactional memory (TM) in both hardware and software. We present an intermediate approach, in which hardware is us...
Arrvindh Shriraman, Michael F. Spear, Hemayet Hoss...