Sciweavers

1005 search results - page 169 / 201
» Information systems security engineering: a critical compone...
Sort
View
SAC
2006
ACM
14 years 2 months ago
Distributed context management in a mobility and adaptation enabling middleware (MADAM)
CT As computing devices are getting smaller, we tend to bring them everywhere. Consequently the operating conditions of the devices are constantly changing (e.g. changing user requ...
Marius Mikalsen, Nearchos Paspallis, Jacqueline Fl...
IUI
2005
ACM
14 years 2 months ago
A location representation for generating descriptive walking directions
An expressive representation for location is an important component in many applications. However, while many location-aware applications can reason about space at the level of co...
Gary Look, Buddhika Kottahachchi, Robert Laddaga, ...
WSC
2007
13 years 11 months ago
Enabling smooth and scalable dynamic 3d visualization of discrete-event construction simulations in outdoor augmented reality
Visualization is a powerful method for verifying, validating, and communicating the results of a simulated model. Lack of visual understanding about a simulated model is one of th...
Amir H. Behzadan, Vineet R. Kamat
SEKE
2005
Springer
14 years 2 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
14 years 2 months ago
Power-aware data analysis in sensor networks
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...