Sciweavers

2015 search results - page 333 / 403
» Hidden Software Capabilities
Sort
View
88
Voted
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
15 years 4 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
88
Voted
ROBOCUP
1999
Springer
145views Robotics» more  ROBOCUP 1999»
15 years 4 months ago
5dpo-2000 Team Description
This paper briefly describes the design principles of the hardware and software of 5dpo-2000 team. An evolutive approach is presented as the robots are constantly being improved wi...
Paulo Costa, António Moreira, Armando Sousa...
95
Voted
AGENTS
1997
Springer
15 years 4 months ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
104
Voted
INFOCOM
1996
IEEE
15 years 4 months ago
Flow Labelled IP: A Connectionless Approach to ATM
A number of proposals for supporting IP over ATM are under discussion in the networking community including: LAN emulation, classical IP over ATM, routing over large clouds, and m...
Peter Newman, Thomas L. Lyon, Greg Minshall
ESEC
1997
Springer
15 years 4 months ago
Developing Multimedia Applications with the WinWin Spiral Model
Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems....
Barry W. Boehm, Alexander Egyed, Julie Kwan, Raymo...