Sciweavers

2436 search results - page 392 / 488
» Comonadic Notions of Computation
Sort
View
JITECH
2008
117views more  JITECH 2008»
15 years 4 months ago
Towards a theory of organizational information services
: The use of information technology (IT) in organizations has undergone dramatic changes the past 30 years. As a result, it has become increasingly common to adopt a services rathe...
Lars Mathiassen, Carsten Sørensen
JMM2
2008
107views more  JMM2 2008»
15 years 4 months ago
Finding Interesting Images in Albums using Attention
Commercial systems such as Flickr display interesting photos from their collection as an interaction mechanism for sampling the collection. It purely relies on social activity anal...
Karthikeyan Vaiapury, Mohan S. Kankanhalli
DKE
2007
131views more  DKE 2007»
15 years 4 months ago
Reasoning and change management in modular ontologies
ct 9 The benefits of modular representations are well known from many areas of computer science. While in software engi10 neering modularization is mainly a vehicle for supporting...
Heiner Stuckenschmidt, Michel C. A. Klein
JUCS
2008
134views more  JUCS 2008»
15 years 4 months ago
A Tool for Reasoning about Qualitative Temporal Information: the Theory of S-languages with a Lisp Implementation
: Reasoning about incomplete qualitative temporal information is an essential topic in many artificial intelligence and natural language processing applications. In the domain of n...
Irène Durand, Sylviane R. Schwer
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang