Sciweavers

3516 search results - page 560 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICDE
2009
IEEE
140views Database» more  ICDE 2009»
15 years 1 months ago
Routing Questions to the Right Users in Online Communities
Online forums contain huge amounts of valuable user-generated content. In current forum systems, users have to passively wait for other users to visit the forum systems and read/an...
Yanhong Zhou, Gao Cong, Bin Cui, Christian S. Jens...
CIA
2004
Springer
15 years 9 months ago
On the Impact of Agent Communication Languages on the Implementation of Agent Systems
Abstract. Today’s software platforms that support the construction of agent systems in accordance with the FIPA specifications essentially provide enabling infrastructure servic...
Juan Manuel Serrano, Sascha Ossowski
DAIS
2008
15 years 5 months ago
Using Object Replication for Building a Dependable Version Control System
Object-oriented technologies are frequently used to design and implement distributed applications. Object replication is a well-established approach to increase the dependability f...
Rüdiger Kapitza, Peter Baumann, Hans P. Reise...
ACMSE
2005
ACM
15 years 9 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad
DEBU
2010
128views more  DEBU 2010»
15 years 1 months ago
Panda: A System for Provenance and Data
Panda (for Provenance and Data) is a new project whose goal is to develop a general-purpose system that unifies concepts from existing provenance systems and overcomes some limita...
Robert Ikeda, Jennifer Widom