Sciweavers

1652 search results - page 307 / 331
» Agent Architectures for Compliance
Sort
View
JBCS
2002
116views more  JBCS 2002»
15 years 1 months ago
Software Components Retrieval Through Mediators and Web Search
Component Based Development (CBD) aims at constructing software through the integration, using interfaces and contracts, between pre-existing components. The main goal of this wor...
Robson P. de Souza, Marcelo N. Costa, Regina M. M....
123
Voted
TRUST
2009
Springer
15 years 8 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
MOBICOM
2003
ACM
15 years 7 months ago
DIRAC: a software-based wireless router system
Routers are expected to play an important role in the IPbased wireless data network. Although a substantial number of techniques have been proposed to improve wireless network per...
Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo...
POPL
2001
ACM
16 years 2 months ago
Secure safe ambients
Secure Safe Ambients (SSA) are a typed variant of Safe Ambients [9], whose type system allows behavioral invariants of ambients to be expressed and verified. The most significant a...
Michele Bugliesi, Giuseppe Castagna
ATAL
2009
Springer
15 years 8 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...