Sciweavers

1306 search results - page 89 / 262
» A Diagrammatic Approach to Model Completion
Sort
View
110
Voted
IAT
2005
IEEE
15 years 6 months ago
Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment
The algorithm we present in this paper aims to optimally distribute and connect the community of loosely coupled middle agents ensuring communication accessibility in a dynamic, i...
David Sislák, Martin Rehák, Michal P...
120
Voted
AOSE
2001
Springer
15 years 5 months ago
Specifying Agent Interaction Protocols with Standard UML
In this paper, I will demonstrate how the Unified Modeling Language (UML) can be used to describe agent interaction protocols. The approach that is presented in this paper does no...
Jürgen Lind
94
Voted
ZUM
2000
Springer
15 years 4 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
110
Voted
WCNC
2010
IEEE
15 years 4 months ago
Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
Abstract—In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper,...
Nirmal Andrews, Yogesh Reddy Kondareddy, Prathima ...
90
Voted
TSD
2010
Springer
14 years 10 months ago
Automatic Detection and Evaluation of Edentulous Speakers with Insufficient Dentures
Abstract. Dental rehabilitation by complete dentures is a state-of-the-art approach to improve functional aspects of the oral cavity of edentulous patients. It is important to assu...
Tobias Bocklet, Florian Hönig, Tino Haderlein...