Sciweavers

47 search results - page 7 / 10
» Automated Logging of Mobile Phones Failures Data
Sort
View
BPM
2009
Springer
157views Business» more  BPM 2009»
13 years 8 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
INFOCOM
2011
IEEE
12 years 11 months ago
Taming user-generated content in mobile networks via Drop Zones
Abstract—Smartphones have changed the way people communicate. Most prominently, using commonplace mobile device features (e.g., high resolution cameras), they started producing a...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
WS
2006
ACM
14 years 1 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
HUC
2004
Springer
14 years 1 months ago
The Error of Our Ways: The Experience of Self-Reported Position in a Location-Based Game
We present a study of people’s use of positional information as part of a collaborative location-based game. The game exploits self-reported positioning in which mobile players m...
Steve Benford, Will Seager, Martin Flintham, Rob A...
POLICY
2004
Springer
14 years 1 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...