Sciweavers

6025 search results - page 1101 / 1205
» Flexibility in Service Processes
Sort
View
116
Voted
RTSS
1999
IEEE
15 years 8 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
126
Voted
WETICE
1999
IEEE
15 years 8 months ago
Collective Choice in Virtual Teams
Virtual organisations within and across enterprise structures are becoming mature as a potentially effective means for goal oriented business teamwork. Among the plentyful of supp...
Alois Ferscha, Christoph Scheiner
113
Voted
HICSS
1998
IEEE
89views Biometrics» more  HICSS 1998»
15 years 8 months ago
Managing Cognitive Overload in the Flora of North America Project
The Flora of North America (FNA) is a large-scale collaboration involving over eight hundred scientists working together to create a 30-volume compendium of all naturally occurrin...
J. Alfredo Sánchez, John L. Schnase, Kay L....
131
Voted
INFOCOM
1998
IEEE
15 years 8 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...
104
Voted
EUROMICRO
1997
IEEE
15 years 7 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
« Prev « First page 1101 / 1205 Last » Next »