Sciweavers

2747 search results - page 273 / 550
» Network externalities in software systems
Sort
View
ATAL
2004
Springer
14 years 2 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
EUROMICRO
2009
IEEE
14 years 5 months ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
AUTONOMICS
2008
ACM
14 years 23 days ago
Tracking and tracing containers through distributed sensor middleware
In a container transport system, wireless sensor networks (WSNs) can be used for monitoring products while they are being transported. To be commercially interesting, these WSNs m...
Klaas Thoelen, Sam Michiels, Wouter Joosen
WWW
2003
ACM
14 years 11 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
EDBTW
2010
Springer
14 years 5 months ago
Biochemical network matching and composition
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
Martin Hugh Goodfellow, John Wilson, Ela Hunt