Sciweavers

1769 search results - page 27 / 354
» An implementation of argument based discussion
Sort
View
HOTI
2005
IEEE
15 years 5 months ago
Design and Implementation of a Content-Aware Switch Using a Network Processor
Cluster based server architectures have been widely used as a solution to overloading in web servers because of their cost effectiveness, scalability and reliability. A content aw...
Li Zhao, Yan Luo, Laxmi N. Bhuyan, Ravishankar R. ...
ECIS
2011
13 years 11 months ago
Analyzing best practice and critical success factors in a health information system case - are there any shortcuts to successful
This paper discusses critical success factors (CSF) and best practice in relation to IT implementation in the health sector. We have studied a University Hospital’s implementati...
Karin Axelsson, Ulf Melin, Fredrik Söderstr&o...
SCN
2010
Springer
122views Communications» more  SCN 2010»
14 years 10 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
EASSS
2001
Springer
15 years 4 months ago
Automated Negotiation and Decision Making in Multiagent Environments
This paper presents some of the key techniques for reaching agreements in multi-agent environments. It discusses game-theory and economics based techniques: strategic negotiation, ...
Sarit Kraus
ICST
2010
IEEE
14 years 10 months ago
Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard
— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzade...