Sciweavers

439 search results - page 61 / 88
» Mobile Process Description and Execution
Sort
View
FGCS
2011
123views more  FGCS 2011»
13 years 2 months ago
Mapping attribution metadata to the Open Provenance Model
A description of a data item’s provenance can be provided in different forms, and which form is best depends on the intended use of that description. Because of this, differen...
Simon Miles
ADHOCNOW
2005
Springer
14 years 1 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
EXPERT
2006
84views more  EXPERT 2006»
13 years 8 months ago
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
abstraction rules that hide the complexity of systems of components. We've begun this process in the domain of sensor/actuator network applications, observing that in manyappl...
Jacob Beal, Jonathan Bachrach
ICAS
2008
IEEE
181views Robotics» more  ICAS 2008»
14 years 2 months ago
Modeling User Interfaces to Workflow Information Systems
This paper addresses the need for designing user interfaces (UIs) to workflow information systems by adopting a model-centric approach. We introduce a conceptual workflow model to...
Josefina Guerrero García, Jean Vanderdonckt...
AOSE
2005
Springer
14 years 1 months ago
Formalisation and Analysis of the Temporal Dynamics of Conditioning
In order to create adaptive Agent Systems with abilities matching those of their biological counterparts, a natural approach is to incorporate classical conditioning mechanisms int...
Tibor Bosse, Catholijn M. Jonker, Sander A. Los, L...