Sciweavers

9210 search results - page 1535 / 1842
» Analyzing Real-Time Systems
Sort
View
SCCC
2005
IEEE
15 years 6 months ago
Optimizing repair programs for consistent query answering
Databases may not satisfy integrity constraints (ICs) for several reasons. Nevertheless, in most of the cases an important part of the data is still consistent wrt certain desired...
Mónica Caniupán Marileo, Leopoldo E....
VISUALIZATION
2005
IEEE
15 years 6 months ago
General Purpose Computation on Graphics Hardware
The rapid increase in the performance of graphics hardware, coupled with recent improvements in its programmability, have made graphics hardware a compelling platform for computat...
Aaron E. Lefohn, Ian Buck, Patrick S. McCormick, J...
WCRE
2005
IEEE
15 years 6 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
108
Voted
WECWIS
2005
IEEE
140views ECommerce» more  WECWIS 2005»
15 years 6 months ago
Developing Flexible Service Portals
Flexible workflow systems are needed for processes that need consistency as well as flexibility (e.g., personalized client interactions). A methodology for designing flexible serv...
Beat Liver, Jeannette Braun, Beatrix Rentsch, Pete...
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
15 years 6 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings
« Prev « First page 1535 / 1842 Last » Next »