Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

kw.\*:("Sevicio proactivo")

Type de document [dt]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Langue

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 609

  • Page / 25
Export

Sélection :

  • et

Hermes : Implementing Goal-Oriented Agent InteractionsCHEONG, Christopher; WINIKOFF, Michael.Lecture notes in computer science. 2006, pp 168-183, issn 0302-9743, isbn 3-540-32616-2, 1Vol, 16 p.Conference Paper

Simplified threshold RSA with adaptive and proactive securityALMANSA, Jesus F; DAMGARD, Ivan; NIELSEN, Jesper Buus et al.Lecture notes in computer science. 2006, pp 593-611, issn 0302-9743, isbn 3-540-34546-9, 1Vol, 19 p.Conference Paper

The Needs of the Many : A Case-Based Group Recommender SystemMCCARTHY, Kevin; MCGINTY, Lorraine; SMYTH, Barry et al.Lecture notes in computer science. 2006, pp 196-210, issn 0302-9743, isbn 3-540-36843-4, 1Vol, 15 p.Conference Paper

On-Body Sensing: From Gesture-Based Input to Activity-Driven InteractionLUKOWICZ, Paul; AMFT, Oliver; ROGGEN, Daniel et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 92-96, issn 0018-9162, 5 p.Article

An approach to develop requirement as a core asset in product lineMOON, Mikyeong; YEOM, Keunhyuk.Lecture notes in computer science. 2004, pp 23-34, issn 0302-9743, isbn 3-540-22335-5, 12 p.Conference Paper

An approach to developing core assets in product lineMOON, Mikveone; YEOM, Keunhvuk.Asia-Pacific software engineering conference. 2004, pp 586-588, isbn 0-7695-2245-9, 1Vol, 3 p.Conference Paper

Understanding the effects of contextual constraints on performative behaviour in interactive media installations : Performative InteractionHESPANHOL, Luke; TOMITSCH, Martin.Personal and ubiquitous computing (Print). 2014, Vol 18, Num 7, pp 1651-1665, issn 1617-4909, 15 p.Article

Defending against multiple different attackersHAUSKEN, Kjell; BIER, Vicki M.European journal of operational research. 2011, Vol 211, Num 2, pp 370-384, issn 0377-2217, 15 p.Article

Intrusion tolerant CA scheme with cheaters detection abilityLIWU ZHANG; DENGGUO FENG.Lecture notes in computer science. 2005, pp 378-386, issn 0302-9743, isbn 3-540-29770-7, 1Vol, 9 p.Conference Paper

Kiln inspection: Proactive maintenance : PyroprocessingREINHARDT, Erik.World cement. 2004, Vol 35, Num 12, pp 60-64, issn 0263-6050, 5 p.Article

Proactive communications in agent teamworkYEN, John; XIAOCONG FAN; VOLZ, Richard A et al.Lecture notes in computer science. 2004, pp 271-290, issn 0302-9743, isbn 3-540-20769-4, 20 p.Conference Paper

The banking and finance sector: new paradigms of resiliency and riskNIKSSARIAN, Alexander.International journal of critical infrastructures. 2011, Vol 7, Num 1, pp 50-57, issn 1475-3219, 8 p.Conference Paper

A verifiable random function with short proofs and keysDODIS, Yevgeniy; YAMPOLSKIY, Aleksandr.Lecture notes in computer science. 2005, pp 416-431, issn 0302-9743, isbn 3-540-24454-9, 16 p.Conference Paper

An Agent-Based Middleware for the Design of Activity- Aware ApplicationsTENTORI, Monica; RODRIGUEZ, Marcela D; FAVELA, Jesus et al.IEEE intelligent systems. 2011, Vol 26, Num 3, pp 15-23, issn 1541-1672, 9 p.Article

A state-of-the-art review on scheduling with learning effectsBISKUP, Dirk.European journal of operational research. 2008, Vol 188, Num 2, pp 315-329, issn 0377-2217, 15 p.Article

Implementing Resilience Engineering; How does it integrate with existing corporate management and regulatory requirements?SHERWOOD JONES, Brian; EARTHY, Jonathan.Collection Sciences économiques et sociales. 2008, pp 235-238, isbn 978-2-35671-012-3, 1Vol, 4 p.Conference Paper

MicroPhase : An Approach to Proactively Invoking Garbage Collection for Improved PerformanceFENG XIAN; SRISA-AN, Witawas; HONG JIANG et al.ACM SIGPLAN notices. 2007, Vol 42, Num 10, pp 77-96, issn 1523-2867, 20 p.Conference Paper

Advertisement-Aided Search in a P2P Context Distribution SystemSYGKOUNA, Irene; ANAGNOSTOU, Miltiades; SYKAS, Efstathios et al.Lecture notes in computer science. 2006, pp 892-895, issn 0302-9743, isbn 3-540-34379-2, 4 p.Conference Paper

Edge eavesdropping gamesBEIMEL, Amos; FRANKLIN, Matthew.Lecture notes in computer science. 2006, pp 1-17, issn 0302-9743, isbn 3-540-38080-9, 1Vol, 17 p.Conference Paper

Economic development via university-based technology transfer: strategies for non-elite universitiesBRADSHAW, Ted K; MUNROE, Tapan; WESTWIND, Mark et al.International journal of technology transfer and commercialisation. 2005, Vol 4, Num 3, pp 279-301, issn 1470-6075, 23 p.Article

W3C-WAI content accessibility auditingLUIGI EMILIANI, Pier; BURZAGLI, Laura.Universal access in health telematics (a design code of practice). Lecture notes in computer science. 2005, pp 175-196, issn 0302-9743, isbn 3-540-26167-2, 22 p.Book Chapter

Agent-based management of responsive environmentsSOARES CORREA DA SILVA, Flavio; VASCONCELOS, Wamberto W.Lecture notes in computer science. 2005, pp 224-236, issn 0302-9743, isbn 3-540-29041-9, 13 p.Conference Paper

A policy based framework for context aware ubiquitous ServicesSYUKUR, Evi; SENG WAI LOKE; STANSKI, Peter et al.Lecture notes in computer science. 2004, pp 346-355, issn 0302-9743, isbn 3-540-22906-X, 10 p.Conference Paper

Detecting unknown massive mailing viruses using proactive methodsRUIQI HU; MOK, Aloysius K.Lecture notes in computer science. 2004, pp 82-101, issn 0302-9743, isbn 3-540-23123-4, 20 p.Conference Paper

Shiver motion and core body temperature classification for wearable soldier health monitoring systemsSUNG, Michael; DEVAUL, Rich; JIMENEZ, Silvia et al.International Symposium on Wearable Computers. 2004, pp 192-193, isbn 0-7695-2186-X, 1Vol, 2 p.Conference Paper

  • Page / 25