Sciweavers

273 search results - page 43 / 55
» Invisible Deployment of Integration Processes
Sort
View
HUC
1999
Springer
14 years 9 days ago
Today's Stories
Research frameworks are being developed that involve very young children in the process of development of future technologies. Children, their teachers and parents from schools in ...
Marilyn Panayi, Walter Van de Velde, David M. Roy,...
ATAL
2007
Springer
14 years 1 days ago
A methodology for 3D electronic institutions
In this paper we propose a methodology for the construction of 3D electronic institutions. 3D electronic institutions are normative environments where software and human agents ca...
Anton Bogdanovych, Marc Esteva, Simeon J. Simoff, ...
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 11 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
EDOC
2006
IEEE
13 years 11 months ago
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows
Abstract-- Analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger ...
Rainer Hauser, Michael Friess, Jochen Malte Kü...