Sciweavers

1653 search results - page 133 / 331
» Directed tree-width examples
Sort
View
123
Voted
JCS
2007
103views more  JCS 2007»
15 years 1 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
132
Voted
AAMAS
2004
Springer
15 years 1 months ago
Agent-Mediated Electronic Commerce
Abstract. Electronic commerce has been one of the traditional arenas for agent technology. The complexity of these applications has been a challenge for researchers that have devel...
Carles Sierra
122
Voted
JSW
2007
107views more  JSW 2007»
15 years 1 months ago
Reducing Domain Level Scenarios to Test Component-based Software
—Higher-order black box software tests against independent end user domain requirements has become an issue of increasing importance with compositional reuse of software artifact...
Oliver Skroch, Klaus Turowski
126
Voted
JSW
2007
126views more  JSW 2007»
15 years 1 months ago
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
Vaclav Dvorak
132
Voted
VC
2008
93views more  VC 2008»
15 years 1 months ago
Contact identification for assembly-disassembly simulation with a haptic device
: Assembly/disassembly (A/D) simulations using haptic devices are facing difficulties while simulating insertion/extraction such as cylinders from holes. In order to address this c...
Robert Iacob, Peter Mitrouchev, Jean-Claude L&eacu...