Sciweavers

18697 search results - page 3713 / 3740
» Systemic Security Management
Sort
View
EDM
2010
248views Data Mining» more  EDM 2010»
15 years 5 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
ICWS
2010
IEEE
15 years 5 months ago
Variability Modeling and QoS Analysis of Web Services Orchestrations
The ever-growing choice in diverse services is making service orchestration variability an essential aspect of a composite web service. Influence of this variation on the Quality o...
Ajay Kattepur, Sagar Sen, Benoit Baudry, Albert Be...
DAGSTUHL
2007
15 years 5 months ago
An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple D
Abstract Current, data-driven applications have become more dynamic in nature, with the need to respond to events generated from distributed sources or to react to information extr...
Susan Darling Urban, Suzanne W. Dietrich, Yi Chen
DAIS
2007
15 years 5 months ago
Construction and Execution of Adaptable Applications Using an Aspect-Oriented and Model Driven Approach
Constructing and executing distributed applications that can adapt to their current operating context, in order to maintain or enhance Quality of Service (QoS) attribute levels, ar...
Sten A. Lundesgaard, Arnor Solberg, Jon Oldevik, R...
JAC
2008
15 years 5 months ago
Rule 110: universality and catenations
Cellular automata are a simple model of parallel computation. Many people wonder about the computing power of such a model. Following an idea of S. Wolfram [16], M. Cook [3] has pr...
Gaétan Richard
« Prev « First page 3713 / 3740 Last » Next »