Sciweavers

674 search results - page 54 / 135
» Telephony in the Year 2005
Sort
View
SIGUCCS
2005
ACM
14 years 3 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
SWS
2005
ACM
14 years 3 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
EUC
2005
Springer
14 years 3 months ago
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety
In USA, 2002, approximately 3.2 million intersection-related crashes occurred, corresponding to 50 percent of all reported crashes. In Japan, more than 58 percent of all traffic cr...
Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai ...
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
14 years 3 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
BMCBI
2006
145views more  BMCBI 2006»
13 years 10 months ago
Querying the public databases for sequences using complex keywords contained in the feature lines
Background: High throughput technologies often require the retrieval of large data sets of sequences. Retrieval of EMBL or GenBank entries using keywords is easy using tools such ...
Olivier Croce, Michaël Lamarre, Richard Chris...