Sciweavers

810 search results - page 124 / 162
» A Tool for Enterprise Architecture Analysis
Sort
View
SECURWARE
2008
IEEE
15 years 4 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
ANSS
2006
IEEE
15 years 3 months ago
Performance Enhancement by Eliminating Redundant Function Execution
Programs often call the same function with the same arguments, yielding the same results. We call this phenomenon, “function reuse”. Previously, we have shown such a behavior ...
Peng Chen, Krishna M. Kavi, Robert Akl
73
Voted
ICALT
2006
IEEE
15 years 3 months ago
Implementation of a Personalized Assessment Web Service
This paper describes the design, development and qualitative evaluation of a web-based personalized assessment service of an object–oriented programming course at the University...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham
ICPADS
2005
IEEE
15 years 3 months ago
Automated Discovery of Brand Piracy on the Internet
The Internet has become a key instrument for establishing and promoting product brands. Companies are very interested in detecting any misuse of their logos, plagiarism, grey impo...
Ulrich Pinsdorf, Peter Ebinger
PROMAS
2005
Springer
15 years 3 months ago
Implementing Multi-agent Systems Organizations with INGENIAS
In a multi-agent system, the organization determines the architecture of the whole system, and the way and policies for agent collaboration and interactions. Although this is a key...
Jorge J. Gómez-Sanz, Juan Pavón