Sciweavers

5640 search results - page 1085 / 1128
» The Primacy of Process Architecture
Sort
View
MOBICOM
2005
ACM
14 years 2 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
MOBIDE
2005
ACM
14 years 2 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham
SAC
2005
ACM
14 years 2 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...
ATAL
2005
Springer
14 years 2 months ago
Designing multiparty interaction support in Elva, an embodied tour guide
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...
Jun Zheng, Xiang Yuan, Yam San Chee
COCOON
2005
Springer
14 years 2 months ago
Server Allocation Algorithms for Tiered Systems
Many web-based systems have a tiered application architecture, in which a request needs to transverse all the tiers before finishing its processing. One of the most important QoS...
Kamalika Chaudhuri, Anshul Kothari, Rudi Pendaving...
« Prev « First page 1085 / 1128 Last » Next »