Sciweavers

557 search results - page 93 / 112
» Goals and means in action observation: A computational appro...
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 8 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
AAMAS
2007
Springer
15 years 8 months ago
Optimal Control in Large Stochastic Multi-agent Systems
Abstract. We study optimal control in large stochastic multi-agent systems in continuous space and time. We consider multi-agent systems where agents have independent dynamics with...
Bart van den Broek, Wim Wiegerinck, Bert Kappen
ICCS
2004
Springer
15 years 7 months ago
Using Runtime Measurements and Historical Traces for Acquiring Knowledge in Parallel Applications
Abstract. A new approach for acquiring knowledge of parallel applications regarding resource usage and for searching similarity on workload traces is presented. The main goal is to...
Luciano José Senger, Marcos José San...
BIRTHDAY
2009
Springer
15 years 8 months ago
Web Service Composition via the Customization of Golog Programs with User Preferences
Abstract. We claim that user preferences are a key component of effective Web service composition, and one that has largely been ignored. In this paper we propose a means of speci...
Shirin Sohrabi, Nataliya Prokoshyna, Sheila A. McI...
EH
1999
IEEE
351views Hardware» more  EH 1999»
15 years 6 months ago
Evolvable Hardware or Learning Hardware? Induction of State Machines from Temporal Logic Constraints
Here we advocate an approach to learning hardware based on induction of finite state machines from temporal logic constraints. The method involves training on examples, constraint...
Marek A. Perkowski, Alan Mishchenko, Anatoli N. Ch...