Sciweavers

1664 search results - page 284 / 333
» Making a Case for Multi-Agent Systems
Sort
View
127
Voted
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 13 days ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 13 days ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
108
Voted
JOT
2007
131views more  JOT 2007»
15 years 12 days ago
Quality of Service Contract Specification, Establishment, and Monitoring for Service Level Management
This paper describes a Quality of Service (QoS) management approach and architecture as well as a case study for Service Level Management (SLM). Our approach brings in a new persp...
Changzhou Wang, Haiqin Wang, Alice Chen, Rodolfo A...
95
Voted
RE
2008
Springer
15 years 8 hour ago
Examining the Relationships between Performance Requirements and "Not a Problem" Defect Reports
Missing or imprecise requirements can lead stakeholders to make incorrect assumptions. A "Not a Problem" defect report (NaP) describes a software behavior that a stakeho...
Chih-Wei Ho, Laurie Williams, Brian Robinson
ESEM
2010
ACM
14 years 11 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams