Sciweavers

1412 search results - page 170 / 283
» The Value of Outsourced Software
Sort
View
COMPSAC
2007
IEEE
14 years 4 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Agile Practices to Spark Innovation in a Small to Medium Sized Business
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...
Ken H. Judy, Ilio Krumins-Beens
BTW
2007
Springer
191views Database» more  BTW 2007»
14 years 4 months ago
The Information Integrator: Using Semantic Technology to provide a single view to distributed data
: For the integration of data that resides in autonomous data sources Software AG uses ontologies. Data source ontologies describe the data sources themselves. Business ontologies ...
Jürgen Angele, Michael Gesmann
PEPM
2007
ACM
14 years 4 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
AUIC
2006
IEEE
14 years 4 months ago
A wearable fatigue monitoring system: application of human-computer interaction evaluation
We developed a wearable fatigue monitoring system with a high-sensitivity 2-axis accelerometer and an on-board signal processing microcontroller. The proposed system measures fain...
Soichiro Matsushita, Ayumi Shiba, Kan Nagashima