Sciweavers

4190 search results - page 627 / 838
» Implementing commitment-based interactions
Sort
View
WOSP
2004
ACM
15 years 8 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
AOSE
2004
Springer
15 years 8 months ago
A Study of Some Multi-agent Meta-models
Several agent-oriented methodologies have been proposed over the last few years. Unlike the object-oriented domain and unfortunately for designers, most of the time, each methodolo...
Carole Bernon, Massimo Cossentino, Marie Pierre Gl...
AP2PC
2004
Springer
15 years 8 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
150
Voted
ATAL
2004
Springer
15 years 8 months ago
Learning User Preferences for Wireless Services Provisioning
The problem of interest is how to dynamically allocate wireless access services in a competitive market which implements a take-it-or-leave-it allocation mechanism. In this paper ...
George Lee, Steven Bauer, Peyman Faratin, John Wro...
CDVE
2004
Springer
109views Visualization» more  CDVE 2004»
15 years 8 months ago
Interest Management for Collaborative Environments Through Dividing Their Shared State
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...
Michal Masa, Jiri Zara