A sigma-lognormal model-based approach to generating large synthetic online handwriting sample databases. | 4 | 0.39 | 2017 |
Implementing Managed Loosely-Coupled Distributed Business Processes: A New Approach Using DIME Networks | 2 | 0.43 | 2012 |
CSNA: A Social networking solution for RCS and mobile user | 0 | 0.34 | 2011 |
Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments | 7 | 0.49 | 2011 |
Enterprise Usability of Cloud Computing Environments: Issues and Challenges | 18 | 1.09 | 2010 |
FCAPS in the Business Services Fabric Model | 8 | 0.92 | 2009 |
A 1.1V 5-to-6GHz reduced-component direct-conversion transmit signal path in 45nm CMOS. | 0 | 0.34 | 2009 |
Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation & Management | 11 | 0.86 | 2009 |
A single-chip highly linear 2.4GHz 30dBm power amplifier in 90nm CMOS. | 12 | 1.90 | 2009 |
The Virtual Business Services Fabric: An Integrated Abstraction of Services and Computing Infrastructure | 9 | 1.72 | 2009 |
An Efficient Approach for Location Updating in Mobile Ad Hoc Networks | 0 | 0.34 | 2008 |
Node Stability-Based Location Updating in Mobile Ad-Hoc Networks | 8 | 0.54 | 2008 |
Query processing in distributed databases with nondisjoint data | 1 | 0.35 | 1993 |
Basic Issues for Developing Distributed Applications Interacting with Legacy Systems and Databases | 0 | 0.34 | 1993 |
Composite B-tree: an Access Aid for Query Processing and Integrity Enforcement. | 0 | 0.34 | 1992 |
Software Engineering Environments - What Do We Want? | 0 | 0.34 | 1992 |
Temporal Object-Oriented Database: (II) Implementation | 0 | 0.34 | 1992 |
Integrated Magic Set Method: a Rule Rewrite Scheme for Optimising Linear Datalog Programs. | 0 | 0.34 | 1991 |
Incorporating a Model Hierarchy into the ER Paradigm | 13 | 22.05 | 1990 |
Implications Of Program Properties For Efficient Storage And Compilation | 0 | 0.34 | 1987 |
IDS: An intelligent document system | 2 | 0.72 | 1985 |
An Investigation Of Different String Coding Methods | 5 | 3.13 | 1984 |