Sciweavers

909 search results - page 165 / 182
» Managing Requirements for Business Value
Sort
View
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 4 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
PPPJ
2006
ACM
15 years 4 months ago
Propagation of JML non-null annotations in Java programs
Development of high quality code is extremely dicult. Tools that help maintaining the proper quality of code produced by programmers can be very useful: they may increase the qua...
Maciej Cielecki, Jedrzej Fulara, Krzysztof Jakubcz...
MSWIM
2005
ACM
15 years 3 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
ATAL
2005
Springer
15 years 3 months ago
Bumping strategies for the multiagent agreement problem
We introduce the Multiagent Agreement Problem (MAP) to represent a class of multiagent scheduling problems. MAP is based on the Distributed Constraint Reasoning (DCR) paradigm and...
Pragnesh Jay Modi, Manuela M. Veloso
77
Voted
NOSSDAV
2005
Springer
15 years 3 months ago
A traffic model for the Xbox game Halo 2
This paper analyses the traffic characteristics of, and proposes a traffic model for, the Xbox game Halo 2. Our goal is to help players and network providers to estimate the amoun...
Sebastian Zander, Grenville J. Armitage