Sciweavers

374 search results - page 56 / 75
» Deployment automation with BLITZ
Sort
View
ER
1998
Springer
100views Database» more  ER 1998»
14 years 25 days ago
Designing Well-Structured Websites: Lessons to Be Learned from Database Schema Methodology
Abstract. In this paper we argue that many of the problems one may experience while visiting websites today may be avoided if their builders adopt a proper methodology for designin...
Olga De Troyer
DCOSS
2010
Springer
14 years 18 days ago
Time-Critical Data Delivery in Wireless Sensor Networks
A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmissi...
Petcharat Suriyachai, James Brown, Utz Roedig
CAISE
2009
Springer
14 years 18 days ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
PODC
2010
ACM
14 years 14 days ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
14 years 10 days ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes