Sciweavers

2025 search results - page 351 / 405
» A Reliable Software Architecture for Complex Embedded System...
Sort
View
DRM
2008
Springer
15 years 6 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
MIDDLEWARE
2009
Springer
15 years 11 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
KI
1998
Springer
15 years 8 months ago
GOLEX - Bridging the Gap between Logic (GOLOG) and a Real Robot
The control of mobile robots acting autonomously in the real world is one of the long-term goals of the field of artificial intelligence. So far the field lacks methods bridging th...
Dirk Hähnel, Wolfram Burgard, Gerhard Lakemey...
SIGMOD
2011
ACM
222views Database» more  SIGMOD 2011»
14 years 7 months ago
Data generation using declarative constraints
We study the problem of generating synthetic databases having declaratively specified characteristics. This problem is motivated by database system and application testing, data ...
Arvind Arasu, Raghav Kaushik, Jian Li
E4MAS
2006
Springer
15 years 8 months ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers