Sciweavers

1663 search results - page 158 / 333
» Computer Security in the Real World
Sort
View
NORDICHI
2004
ACM
15 years 9 months ago
Place storming: performing new technologies in context
We present Place Storming, an original method of brainstorming technological concepts, particularly in the area of pervasive computing. Place Storming is contextdriven and play-ba...
Ken Anderson, Jane McGonigal
GI
2004
Springer
15 years 9 months ago
Generating Dialogue Applications with the GEMINI Platform
: Within the EC funded research project GEMINI (Generic Environment for Multilingual Interactive Natural Interfaces) we aim at the development of a platform that assists the user t...
Stefan W. Hamerich, Volker Schless, Volker Schuber...
GI
2004
Springer
15 years 9 months ago
XML-based Data Integration for Semantic Information Portals
: This paper addresses some classical problems to integrate data sources that are heterogeneous in structure with possibly redundant data along a real world example integrating thr...
Patrick Lehti, Peter Fankhauser, Silvia von Stacke...
APPT
2003
Springer
15 years 9 months ago
Scheduling Outages in Distributed Environments
This paper focuses on the problem of scheduling outages to computer systems in complex distributed environments. The interconnected nature of these systems makes scheduling global ...
Anthony Butler, Hema Sharda, David Taniar
ICCTA
2007
IEEE
15 years 7 months ago
What Graphs can be Efficiently Represented by BDDs?
We have carried out experimental research into implicit representation of large graphs using reduced ordered binary decision diagrams (OBDDs). We experimentally show that for grap...
Changxing Dong, Paul Molitor