Sciweavers

1281 search results - page 237 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
CASES
2006
ACM
14 years 2 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson
ATAL
2006
Springer
14 years 6 days ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 8 months ago
Ranking distributed probabilistic data
Ranking queries are essential tools to process large amounts of probabilistic data that encode exponentially many possible deterministic instances. In many applications where unce...
Feifei Li, Ke Yi, Jeffrey Jestes
CHI
1996
ACM
14 years 19 days ago
Technomethodology: Paradoxes and Possibilities
The design of CSCW systems has often had its roots in ethnomethodological understandings of work and investigations of working settings. Increasingly, we are also seeing these ide...
Graham Button, Paul Dourish
ICSE
2005
IEEE-ACM
14 years 8 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu