Sciweavers

15888 search results - page 2895 / 3178
» Supporting human-intensive systems
Sort
View
IJIPT
2007
116views more  IJIPT 2007»
15 years 3 months ago
Context as autonomic intelligence in a ubiquitous computing environment
: This paper presents the ANS architecture that uses ubiquitous computing to monitor medical patients in the home. Since there is no notion of the patient carrying out maintenance ...
Markus C. Huebscher, Julie A. McCann, Asher Hoskin...
SIMULATION
2008
139views more  SIMULATION 2008»
15 years 3 months ago
Constitutive Hybrid Processes: a Process-Algebraic Semantics for Hybrid Bond Graphs
Models of physical systems have to be based on physical principles such as conservation of energy and continuity of power. These principles are inherently enforced by the bond gra...
Pieter J. L. Cuijpers, Jan F. Broenink, Pieter J. ...
AIR
2005
120views more  AIR 2005»
15 years 3 months ago
Rascal: A Recommender Agent for Agile Reuse
As software organisations mature, their repositories of reusable software components from previous projects will also grow considerably. Remaining conversant with all components in...
Frank McCarey, Mel Ó Cinnéide, Nicho...
SOCO
2008
Springer
15 years 3 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
IJNSEC
2007
143views more  IJNSEC 2007»
15 years 3 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
« Prev « First page 2895 / 3178 Last » Next »