Sciweavers

4752 search results - page 831 / 951
» Dependability in Web Software
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 3 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
14 years 3 months ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
DNA
2001
Springer
14 years 2 months ago
The Fidelity of the Tag-Antitag System
In the universal DNA chip method, target RNAs are mapped onto a set of DNA tags. Parallel hybridization of these tags with an indexed, complementary antitag array then provides an ...
John A. Rose, Russell J. Deaton, Masami Hagiya, Ak...
DEXAW
2000
IEEE
89views Database» more  DEXAW 2000»
14 years 2 months ago
A Conceptual Architecture for a Combined Negotiation Support System
In a combined negotiation in e-commerce, the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are inde...
Morad Benyoucef, Rudolf K. Keller
ECBS
2000
IEEE
115views Hardware» more  ECBS 2000»
14 years 2 months ago
PuLSE-I: Deriving Instances from a Product Line Infrastructure
Reusing assets during application engineering promises to improve the efficiency of systems development. However, in order to benefit from reusable assets, application engineeri...
Joachim Bayer, Cristina Gacek, Dirk Muthig, Tanya ...