Sciweavers

6709 search results - page 1313 / 1342
» Performance Modelling of the Computational Hardware: A Stati...
Sort
View
WS
2006
ACM
14 years 22 days ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
14 years 9 days ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
PERVASIVE
2010
Springer
13 years 8 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
JSS
2007
80views more  JSS 2007»
13 years 6 months ago
Feedback control-based dynamic resource management in distributed real-time systems
The resource management in distributed real-time systems becomes increasingly unpredictable with the proliferation of data-driven applications. Therefore, it is inefficient to all...
Tian He, John A. Stankovic, Michael Marley, Chenya...
ICSOC
2009
Springer
13 years 4 months ago
Future Research Topics in Enterprise Architecture Management - A Knowledge Management Perspective
Identifying, gathering, and maintaining information on the current, planned, and target states of the architecture of an enterprise is one major challenge of enterprise architectur...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
« Prev « First page 1313 / 1342 Last » Next »