Sciweavers

3767 search results - page 164 / 754
» Design and implementation of a generalized laboratory data m...
Sort
View
CACM
1998
103views more  CACM 1998»
13 years 9 months ago
The Virtual Design Team
The long range goal of the “Virtual Design Team” (VDT) research program is to develop computational tools to analyze decision making and communication behavior and thereby to ...
John C. Kunz, Tore R. Christiansen, Geoff P. Cohen...
OOPSLA
2007
Springer
14 years 3 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
JNCA
2006
86views more  JNCA 2006»
13 years 9 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
WWW
2009
ACM
14 years 10 months ago
Bucefalo: a tool for intelligent search and filtering for web-based personal health records
In this poster, a tool named BUCEFALO is presented. This tool is specially designed to improve the information retrieval tasks in web-based Personal Health Records (PHR). This too...
Francisco P. Romero, Jesús Serrano-Guerrero...
CISS
2008
IEEE
14 years 3 months ago
Threshold structure of channel aware distributed scheduling in ad-hoc networks: An optimal stopping view
— As evidenced by measurement data, channel fading and co-channel interference occur on the same time scales, and it is therefore difficult to determine if packet losses are due...
Junshan Zhang