Sciweavers

139 search results - page 11 / 28
» Graph-based methods for the analysis of large-scale multiage...
Sort
View
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
15 years 1 months ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
DMS
2008
167views Multimedia» more  DMS 2008»
14 years 11 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far
SIAMSC
2010
198views more  SIAMSC 2010»
14 years 8 months ago
Analysis of Block Parareal Preconditioners for Parabolic Optimal Control Problems
In this paper, we describe block matrix algorithms for the iterative solution of large scale linear-quadratic optimal control problems arising from the optimal control of parabolic...
Tarek P. Mathew, Marcus Sarkis, Christian E. Schae...
MMAS
2004
Springer
15 years 3 months ago
Agent Server Technology for Managing Millions of Agents
d to submit first an abstract (to signal your interest and contribution) and then a full paper (for review) to the workshop. All accepted papers will be published as a volume from ...
Gaku Yamamoto
80
Voted
PDCAT
2007
Springer
15 years 3 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling