Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sevicio proactivo")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 400

  • Page / 16
Export

Selection :

  • and

Hermes : Implementing Goal-Oriented Agent InteractionsCHEONG, Christopher; WINIKOFF, Michael.Lecture notes in computer science. 2006, pp 168-183, issn 0302-9743, isbn 3-540-32616-2, 1Vol, 16 p.Conference Paper

On-Body Sensing: From Gesture-Based Input to Activity-Driven InteractionLUKOWICZ, Paul; AMFT, Oliver; ROGGEN, Daniel et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 92-96, issn 0018-9162, 5 p.Article

An approach to develop requirement as a core asset in product lineMOON, Mikyeong; YEOM, Keunhyuk.Lecture notes in computer science. 2004, pp 23-34, issn 0302-9743, isbn 3-540-22335-5, 12 p.Conference Paper

An approach to developing core assets in product lineMOON, Mikveone; YEOM, Keunhvuk.Asia-Pacific software engineering conference. 2004, pp 586-588, isbn 0-7695-2245-9, 1Vol, 3 p.Conference Paper

Understanding the effects of contextual constraints on performative behaviour in interactive media installations : Performative InteractionHESPANHOL, Luke; TOMITSCH, Martin.Personal and ubiquitous computing (Print). 2014, Vol 18, Num 7, pp 1651-1665, issn 1617-4909, 15 p.Article

Defending against multiple different attackersHAUSKEN, Kjell; BIER, Vicki M.European journal of operational research. 2011, Vol 211, Num 2, pp 370-384, issn 0377-2217, 15 p.Article

Intrusion tolerant CA scheme with cheaters detection abilityLIWU ZHANG; DENGGUO FENG.Lecture notes in computer science. 2005, pp 378-386, issn 0302-9743, isbn 3-540-29770-7, 1Vol, 9 p.Conference Paper

Kiln inspection: Proactive maintenance : PyroprocessingREINHARDT, Erik.World cement. 2004, Vol 35, Num 12, pp 60-64, issn 0263-6050, 5 p.Article

Proactive communications in agent teamworkYEN, John; XIAOCONG FAN; VOLZ, Richard A et al.Lecture notes in computer science. 2004, pp 271-290, issn 0302-9743, isbn 3-540-20769-4, 20 p.Conference Paper

The banking and finance sector: new paradigms of resiliency and riskNIKSSARIAN, Alexander.International journal of critical infrastructures. 2011, Vol 7, Num 1, pp 50-57, issn 1475-3219, 8 p.Conference Paper

A verifiable random function with short proofs and keysDODIS, Yevgeniy; YAMPOLSKIY, Aleksandr.Lecture notes in computer science. 2005, pp 416-431, issn 0302-9743, isbn 3-540-24454-9, 16 p.Conference Paper

An ontology-driven system architecture for precision agriculture applicationsGOUMOPOULOS, Christos; KAMEAS, Achilles D; CASSELLS, Alan et al.International journal of metadata, semantics and ontologies (Print). 2009, Vol 4, Num 1-2, pp 72-84, issn 1744-2621, 13 p.Article

The development of an instrument to measure readiness for knowledge managementHOLT, Daniel T; BARTCZAK, Summer E; CLARK, Steven W et al.Knowledge management research and practice (Print). 2007, Vol 5, Num 2, pp 75-92, issn 1477-8238, 18 p.Article

Intelligent prognostics tools and e-maintenanceLEE, Jay; JUN NI; DJURDJANOVIC, Dragan et al.Computers in industry. 2006, Vol 57, Num 6, pp 476-489, issn 0166-3615, 14 p.Article

Higher dependability and security for mobile applicationsHONGXIA JIN.Lecture notes in computer science. 2006, pp 89-103, issn 0302-9743, isbn 3-540-33376-2, 1Vol, 15 p.Conference Paper

Security Enhancement Mechanism for Ad-Hoc OLSR ProtocolDOH, Inshil; CHAE, Kijoon; KIM, Howon et al.Lecture notes in computer science. 2006, pp 317-326, issn 0302-9743, isbn 3-540-48563-5, 1Vol, 10 p.Conference Paper

Frame of interest approach on quality of prediction for agent-based network monitoringSCHULZ, Stefan; SCHULZ, Michael; TANNER, Andreas et al.Lecture notes in computer science. 2004, pp 246-259, issn 0302-9743, isbn 3-540-21238-8, 14 p.Conference Paper

Salion's experience with a reactive software product line approachBUHRDORF, Ross; CHURCHETT, Dale; KRUEGER, Charles W et al.Lecture notes in computer science. 2004, pp 317-322, issn 0302-9743, isbn 3-540-21941-2, 6 p.Conference Paper

PPSAM: Proactive PowerShell Anti-Malware: Customizable Comprehensive Tool to Supplement Commercial AVsVILLEGAS, Alejandro; LEI CHEN.Security & management. International conferenceWorldComp'2011. 2011, pp 610-616, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

A Proactive Secret Sharing Scheme in matrix projection methodLI BAI; XUKAI ZOU.International journal of security and networks (Print). 2009, Vol 4, Num 4, pp 201-209, issn 1747-8405, 9 p.Article

Binary Waypoint Geographical Routing in Wireless Mesh NetworksSCHILLER, Eryk; STARZETZ, Paul; ROUSSEAU, Franck et al.ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. 2008, pp 252-259, isbn 978-1-60558-235-1, 1Vol, 8 p.Conference Paper

Proactive mediation in plan-based narrative environmentsHARRIS, Justin; YOUNG, R. Michael.Lecture notes in computer science. 2005, pp 292-304, issn 0302-9743, isbn 3-540-28738-8, 13 p.Conference Paper

Decentralized computation of threshold crossing alertsWUHIB, Fetahi; DAM, Mads; STADLER, Rolf et al.Lecture notes in computer science. 2005, pp 220-232, issn 0302-9743, isbn 3-540-29388-4, 1Vol, 13 p.Conference Paper

Secure software smartcard resilient to captureSEUNG WOOK JUNG; RULAND, Christoph.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30818-0, 2Vol, Part 2, 86-95Conference Paper

Performance management in dynamic computing environmentsKOTSIS, Gabriele.Performance tools and applications to networked systems : revised tutorial lectures. Lecture notes in computer science. 2004, pp 254-264, issn 0302-9743, isbn 3-540-21945-5, 11 p.Book Chapter

  • Page / 16