Sciweavers

1432 search results - page 126 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
131
Voted
IJISTA
2007
119views more  IJISTA 2007»
15 years 3 months ago
Online modelling based on Genetic Programming
: Genetic Programming (GP), a heuristic optimisation technique based on the theory of Genetic Algorithms (GAs), is a method successfully used to identify non-linear model structure...
Stephan M. Winkler, Hajrudin Efendic, Luigi del Re...
146
Voted
NDSS
2009
IEEE
15 years 10 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
142
Voted
PRICAI
2000
Springer
15 years 7 months ago
Task Models, Intentions, and Agent Conversation Policies
It is possible to define conversation policies, such as communication or dialogue protocols, that are based strictly on what messages and, respectively, what performatives may foll...
Renee Elio, Afsaneh Haddadi, Ajit Singh
123
Voted
CISIS
2010
IEEE
15 years 10 months ago
On a Journey from Message to Observable Pervasive Application
—Bringing together heterogeneous computing devices and appliances gives rise to a spontaneous environment where resources exchange messages, such as a mobile phone telling the ca...
Geert Vanderhulst, Kris Luyten, Karin Coninx
KBSE
2009
IEEE
15 years 10 months ago
Generating Fixes from Object Behavior Anomalies
Advances in recent years have made it possible in some cases to locate a bug (the source of a failure) automatically. But debugging is also about correcting bugs. Can tools do thi...
Valentin Dallmeier, Andreas Zeller, Bertrand Meyer