Sciweavers

2178 search results - page 426 / 436
» Toward Systemically Secure IT Architectures
Sort
View
OTM
2005
Springer
14 years 1 months ago
Registering a Business Collaboration Model in Multiple Business Environments
Today business registries are regarded as means of finding services offered by a business partner. However, business registries might also serve as means of seaching inter-organiza...
Birgit Hofreiter, Christian Huemer
KR
2004
Springer
14 years 1 months ago
Advanced Research with Autonomous Unmanned Aerial Vehicles
Abstract The emerging area of intelligent unmanned aerial vehicle (UAV) research has shown rapid development in recent years and offers a great number of research challenges for ar...
Patrick Doherty
PLDI
2003
ACM
14 years 27 days ago
Linear analysis and optimization of stream programs
As more complex DSP algorithms are realized in practice, an increasing need for high-level stream abstractions that can be compiled without sacrificing efficiency. Toward this en...
Andrew A. Lamb, William Thies, Saman P. Amarasingh...
ADC
2003
Springer
106views Database» more  ADC 2003»
14 years 26 days ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
ACSC
2002
IEEE
14 years 18 days ago
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation
Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current...
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham