Sciweavers

2517 search results - page 295 / 504
» Secure Deployment of Components
Sort
View
SIROCCO
2010
13 years 11 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
HCI
2007
13 years 11 months ago
Activity Theoretical Analysis and Design Model for Web-Based Experimentation
This paper presents an Activity Theoretical analysis and design model for Web-based experimentation, which is one of the online activities that plays a key role in the development ...
Anh Vu Nguyen-Ngoc
ICSOFT
2007
13 years 11 months ago
An Algorithm for Automatic Service Composition
Telecommunication companies are struggling to provide their users with value-added services. These services are expected to be context-aware, attentive and personalized. Since it i...
Eduardo Goncalves da Silva, Luís Ferreira P...
MKWI
2008
142views Business» more  MKWI 2008»
13 years 11 months ago
A Decentralized and Ontology-Based Approach to Infrastructure Monitoring
: We introduce infrastructure monitoring as an application domain that demands decentralized system designs. This is motivated by the large scale of these systems, the heterogeneit...
Florian Fuchs, Michael Berger
ACL
2006
13 years 11 months ago
The Role of Information Retrieval in Answering Complex Questions
This paper explores the role of information retrieval in answering "relationship" questions, a new class complex information needs formally introduced in TREC 2005. Sinc...
Jimmy J. Lin