Sciweavers

2594 search results - page 464 / 519
» Environment as Active Support of Interaction
Sort
View
AAAI
2006
13 years 9 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
WOTUG
2007
13 years 8 months ago
Concurrency Control and Recovery Management for Open e-Business Transactions
Concurrency control mechanisms such as turn-taking, locking, serialization, transactional locking mechanism, and operational transformation try to provide data consistency when con...
Amir R. Razavi, Sotiris Moschoyiannis, Paul J. Kra...
ETS
2000
IEEE
155views Hardware» more  ETS 2000»
13 years 7 months ago
Using technologies in teaching: an initiative in academic staff development
Academic staff development in the pedagogical applications of new technologies is fundamental to the transformation of teaching and learning in tertiary education settings. We pre...
Christine Spratt, Stuart Palmer, Jo Coldwell
INFOCOM
2010
IEEE
13 years 6 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
EDOC
2008
IEEE
14 years 2 months ago
Facebook Meets the Virtualized Enterprise
: “Web 2.0” and “cloud computing” are revolutionizing the way IT infrastructure is accessed and managed. Web 2.0 technologies such as blogs, wikis and social networking pla...
Roger Curry, Cameron Kiddle, Nayden Markatchev, Ro...