Sciweavers

2747 search results - page 109 / 550
» Network externalities in software systems
Sort
View
SIGOPSE
2000
ACM
14 years 1 months ago
Deferring trust in fluid replication
Mobile nodes rely on external services to provide safety, sharing, and additional resources. Unfortunately, as mobile nodes move through the networking infrastructure, the costs o...
Brian D. Noble, Ben Fleis, Landon P. Cox
JITECH
2010
160views more  JITECH 2010»
13 years 3 months ago
Social software for business process modeling
Formal models of business processes are used for a variety of purposes. But where the elicitation of the characteristics of a business process usually takes place in a collaborati...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
BSN
2009
IEEE
120views Sensor Networks» more  BSN 2009»
14 years 3 months ago
Textile-Based Wearable Sensors for Assisting Sports Performance
—There is a need for wearable sensors to assess physiological signals and body kinematics during exercise. Such sensors need to be straightforward to use, and ideally the complet...
Shirley Coyle, Deirdre Morris, King Tong Lau, Derm...
HICSS
2006
IEEE
141views Biometrics» more  HICSS 2006»
14 years 3 months ago
An Ontology-Based Architecture for Knowledge Commerce
Inter-organizational knowledge networks and knowledge marketplaces have emerged in order to enable organizations to share or commercially exploit their knowledge outside narrow or...
Kostas Kafentzis, Panos Georgolios, Athanasios Bou...
ICDCSW
2000
IEEE
14 years 17 days ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen