Sciweavers

JSW
2008
131views more  JSW 2008»
13 years 11 months ago
An Application Directed Adaptive Framework for Autonomic Software
Autonomic computing is gradually becoming accepted as a viable approach to achieving self-management in systems and networks, with the goal of lessening the impact of the complexit...
Bridget Meehan, Girijesh Prasad, T. Martin McGinni...
JSW
2008
95views more  JSW 2008»
13 years 11 months ago
An Information System Platform for Anonymous Product Recycling
Recycling is one of the most important solutions for reducing material and energy consumption, and that of end products is considered as the most effective one. To promote recyclin...
Shinsuke Tamura, Kazuya Kouro, Masatoshi Sasatani,...
JSW
2008
164views more  JSW 2008»
13 years 11 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
JSW
2008
121views more  JSW 2008»
13 years 11 months ago
The Comparison of WML, cHTML, and XHTML-MP in m-Commerce
In order to use mobile devices for business application, mobile applications and standard have grown fast
Jongwook Woo, MinSeok Jang
JSW
2008
124views more  JSW 2008»
13 years 11 months ago
Information Storage and Retrieval Schemes for Recycling Products
A recycling object is in its recycle chain and its status may often change according to recycling stage or reusing status; even its structure could often dynamically change accordi...
Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, K...
JSW
2008
136views more  JSW 2008»
13 years 11 months ago
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis
- In the Software Product Line approach, product configuration is a key activity in which stakeholders choose features for a product. This activity is critical in the sense that ca...
Marcílio Mendonça, Donald D. Cowan, ...
JSW
2008
101views more  JSW 2008»
13 years 11 months ago
An Algorithm for Documenting Relationships in a Set of Reports
A typical tabular business report contains a set of cells. The cells may contain raw numeric values, character labels, and formulas. This paper will present a bottom-up algorithm f...
Roger L. Goodwin
JSW
2008
93views more  JSW 2008»
13 years 11 months ago
The Effect of Mobile Phone Screen Size on Video Based Learning
- This paper investigates the effect of mobile
Nipan Maniar, Emily Bennett, Steve Hand, George Al...
JSW
2008
116views more  JSW 2008»
13 years 11 months ago
A Task-oriented Approach to Search Engine Usability Studies
Usability is a multi-dimensional characteristic of a computer system. This paper focuses on usability as a measurement of interaction between the user and the system. The research ...
Isak Taksa, Amanda Spink, Robert Goldberg
JSW
2008
94views more  JSW 2008»
13 years 11 months ago
Thresholding Images of Historical Documents Using a Tsallis-Entropy Based Algorithm
In this paper we present an algorithm for thresholding images of historical documents. The main objective is to generate high quality monochromatic images in order to make them eas...
Carlos A. B. Mello, Luciana A. Schuler