Sciweavers

757 search results - page 119 / 152
» Composing Security-Aware Software
Sort
View
RSP
2003
IEEE
132views Control Systems» more  RSP 2003»
15 years 3 months ago
Rapid Exploration of Pipelined Processors through Automatic Generation of Synthesizable RTL Models
As embedded systems continue to face increasingly higher performance requirements, deeply pipelined processor architectures are being employed to meet desired system performance. ...
Prabhat Mishra, Arun Kejariwal, Nikil Dutt
AWIC
2003
Springer
15 years 3 months ago
Using Case-Based Reasoning to Improve Information Retrieval in Knowledge Management Systems
Abstract. Complementary to hypertext navigation, classic information retrieval is broadly used to find information on the World Wide Web and on Web-based systems. Among these there...
Norbert Gronau, Frank Laskowski
ESOP
2010
Springer
15 years 3 months ago
On the Expressive Power of Primitives for Compensation Handling
Modern software systems have frequently to face unexpected events, reacting so to reach a consistent state. In the field of concurrent and mobile systems (e.g., for web services) ...
Ivan Lanese, Cátia Vaz, Carla Ferreira
NOMS
2002
IEEE
124views Communications» more  NOMS 2002»
15 years 2 months ago
A framework for building reusable mobile agents for network management
Mobile agents can migrate among nodes to perform a set of management tasks at each of the visited nodes. Existing mobile agent-based network management systems often assume that t...
Ichiro Satoh
SEMWEB
2001
Springer
15 years 2 months ago
DAML-S: Semantic Markup for Web Services
The Semantic Web should enable greater access not only to content but also to services on the Web. Users and software agents should be able to discover, invoke, compose, and monit...
Anupriya Ankolekar, Mark H. Burstein, Jerry R. Hob...