Sciweavers

11921 search results - page 2194 / 2385
» Community Information Management
Sort
View
143
Voted
EJIS
2006
132views more  EJIS 2006»
15 years 3 months ago
Enacting new temporal boundaries: the role of mobile phones
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...
Elpida Prasopoulou, Athanasia Pouloudi, Niki Pante...
150
Voted
ENTCS
2006
127views more  ENTCS 2006»
15 years 3 months ago
A System Architecture for Context-Aware Service Discovery
Recent technological advances have enabled both the consumption and provision of mobile services (m-services) by small, portable, handheld devices. However, mobile devices still h...
Christos Doulkeridis, Nikos Loutas, Michalis Vazir...
127
Voted
ESE
2006
97views Database» more  ESE 2006»
15 years 3 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán
132
Voted
FMSD
2006
183views more  FMSD 2006»
15 years 3 months ago
An algebraic theory for behavioral modeling and protocol synthesis in system design
The design productivity gap has been recognized by the semiconductor industry as one of the major threats to the continued growth of system-on-chips and embedded systems. Ad-hoc sy...
Jean-Pierre Talpin, Paul Le Guernic
149
Voted
GRID
2006
Springer
15 years 3 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
« Prev « First page 2194 / 2385 Last » Next »