Sciweavers

12478 search results - page 2492 / 2496
» Secure Interaction Design
Sort
View
CASCON
2010
204views Education» more  CASCON 2010»
13 years 2 months ago
Effective collaboration and consistency management in business process modeling
ion and giving them a medium to express and implement change. One of the keys to achieve agility for creating business processes depends on close interaction between IT department ...
Moises Castelo Branco, Yingfei Xiong, Krzysztof Cz...
BMCBI
2011
13 years 2 months ago
R2R - software to speed the depiction of aesthetic consensus RNA secondary structures
Background: With continuing identification of novel structured noncoding RNAs, there is an increasing need to create schematic diagrams showing the consensus features of these mol...
Zasha Weinberg, Ronald R. Breaker
CORR
2011
Springer
243views Education» more  CORR 2011»
13 years 2 months ago
Distributed Estimation and False Data Detection with Application to Power Networks
This work presents a distributed method for control centers in a power network to estimate the operating condition of the power plant, and to ultimately determine the occurrence o...
Fabio Pasqualetti, Ruggero Carli, Francesco Bullo
CSCW
2011
ACM
13 years 2 months ago
"Not my bug!" and other reasons for software bug report reassignments
Bug reporting/fixing is an important social part of the software development process. The bug-fixing process inherently has strong inter-personal dynamics at play, especially in h...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
SCN
2011
Springer
348views Communications» more  SCN 2011»
13 years 2 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla
« Prev « First page 2492 / 2496 Last » Next »