Sciweavers

1195 search results - page 207 / 239
» Resources for Situated Actions
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
CCECE
2006
IEEE
14 years 2 months ago
A Dynamic Associative E-Learning Model based on a Spreading Activation Network
Presenting information to an e-learning environment is a challenge, mostly, because ofthe hypertextlhypermedia nature and the richness ofthe context and information provides. This...
Phongchai Nilas, Nilamit Nilas, Somsak Mitatha
RULEML
2005
Springer
14 years 1 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
VLDB
2004
ACM
108views Database» more  VLDB 2004»
14 years 1 months ago
QStream: Deterministic Querying of Data Streams
Current developments in processing data streams are based on the best-effort principle and therefore not adequate for many application areas. When sensor data is gathered by inte...
Sven Schmidt, Henrike Berthold, Wolfgang Lehner
CSFW
2003
IEEE
14 years 1 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows