Sciweavers

1211 search results - page 124 / 243
» Computing Manipulations of Ranking Systems
Sort
View
DAC
2004
ACM
14 years 11 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
POPL
2008
ACM
14 years 10 months ago
Systems biology, models, and concurrency
Models will play a central role in the representation, storage, manipulation, and communication of knowledge in systems biology. Models capable of fulfilling such a role will like...
Walter Fontana
JSS
2006
111views more  JSS 2006»
13 years 10 months ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke
MOBISYS
2008
ACM
14 years 9 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
MHCI
2009
Springer
14 years 4 months ago
Improving the recommendation of mobile services by interpreting the user's icon arrangement
The aether soon will be pervaded with a high density of digital services for usage on mobile phones. Personalization plays a crucial role for the success and acceptance of such sy...
Matthias Böhmer, Gernot Bauer