Sciweavers

1778 search results - page 324 / 356
» Building a Knowledge Base: An Example
Sort
View
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ATAL
2003
Springer
15 years 3 months ago
Customizing AOSE methodologies by reusing AOSE features
Future large-scale software development projects will require engineering support for a diverse range of software quality attributes, such as privacy and openness. It is not feasi...
Thomas Juan, Leon Sterling, Maurizio Martelli, Viv...
CAISE
2003
Springer
15 years 3 months ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp
CLUSTER
2002
IEEE
15 years 3 months ago
Scalable Resource Management in High Performance Computers
Clusters of workstations have emerged as an important platform for building cost-effective, scalable, and highlyavailable computers. Although many hardware solutions are available...
Eitan Frachtenberg, Fabrizio Petrini, Juan Fern&aa...
COOPIS
2002
IEEE
15 years 3 months ago
PROLOG/RDBMS Integration in the NED Intelligent Information System
Abstract. The following paper describes recent work on NED-2, an intelligent information system for ecosystem management currently in development by the USDA Forest Service. Using ...
Frederick Maier, Donald Nute, Walter D. Potter, Ji...