Sciweavers

3686 search results - page 682 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
JUCS
2010
162views more  JUCS 2010»
13 years 6 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
JUCS
2010
172views more  JUCS 2010»
13 years 6 months ago
Configuration Process of a Software Product Line for AmI Middleware
: Developing Ambient Intelligence applications is a very complex task since it implies dealing with low-level software and hardware resources. The use of a middleware platform may ...
Lidia Fuentes, Nadia Gámez
I3E
2009
134views Business» more  I3E 2009»
13 years 5 months ago
Realizing Mobile Web Services for Dynamic Applications
Use of web services also on mobile devices becomes increasingly relevant. However, realizing such mobile web services based on the standard protocol stack is often inappropriate f...
Sonja Zaplata, Viktor Dreiling, Winfried Lamersdor...
DAC
2006
ACM
14 years 8 months ago
Generation of yield-aware Pareto surfaces for hierarchical circuit design space exploration
Pareto surfaces in the performance space determine the range of feasible performance values for a circuit topology in a given technology. We present a non-dominated sorting based ...
Saurabh K. Tiwary, Pragati K. Tiwary, Rob A. Ruten...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
14 years 2 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang