Sciweavers

259 search results - page 45 / 52
» Workflow Exception Patterns
Sort
View
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
TPDS
2008
183views more  TPDS 2008»
13 years 8 months ago
Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution
In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We c...
Xiaobing Wu, Guihai Chen, Sajal K. Das
INFOCOM
2010
IEEE
13 years 7 months ago
Design and Analysis of a Robust Pipelined Memory System
Abstract—Many network processing applications require wirespeed access to large data structures or a large amount of flowlevel data, but the capacity of SRAMs is woefully inadeq...
Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun Xu
NGC
2010
Springer
183views Communications» more  NGC 2010»
13 years 3 months ago
Brain-like Computing Based on Distributed Representations and Neurodynamics
A key to overcoming the limitations of classical artificial intelligence and to deal well with enormous amounts of information might be brain-like computing in which distributed re...
Ken Yamane, Masahiko Morita
IWPSE
2005
IEEE
14 years 2 months ago
Evolution and Growth in Large Libre Software Projects
Software evolution research has recently focused on new development paradigms, studying whether laws found in more classic development environments also apply. Previous works have...
Gregorio Robles, Juan José Amor, Jesú...