Sciweavers

331 search results - page 64 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 20 days ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
BMCBI
2007
147views more  BMCBI 2007»
13 years 7 months ago
Modeling biochemical transformation processes and information processing with Narrator
Background: Software tools that model and simulate the dynamics of biological processes and systems are becoming increasingly important. Some of these tools offer sophisticated gr...
Johannes J. Mandel, Hendrik Fuß, Niall M. Pa...
ICFP
2006
ACM
14 years 7 months ago
Recursive modules for programming
d abstract) Keiko Nakata1 Jacques Garrigue2 1 Kyoto University Research Institute for Mathematical Sciences 2 Graduate School of Mathematics, Nagoya University The ML module syste...
Keiko Nakata, Jacques Garrigue
IUI
1993
ACM
13 years 11 months ago
Reducing user effort in collaboration support
incompatibility. We introduce Mona, an operational email system embodying this automatic approach. Mona establishes conversation context independently of user actions through the ...
Andy Cockburn, Harold W. Thimbleby
WWW
2004
ACM
14 years 8 months ago
Session level techniques for improving web browsing performance on wireless links
Recent observations through experiments that we have performed in current third generation wireless networks have revealed that the achieved throughput over wireless links varies ...
Pablo Rodriguez, Sarit Mukherjee, Sampath Rangaraj...