Sciweavers

5475 search results - page 218 / 1095
» Model Driven Security
Sort
View
140
Voted
ICCD
1997
IEEE
123views Hardware» more  ICCD 1997»
15 years 8 months ago
A Parallel Circuit-Partitioned Algorithm for Timing Driven Cell Placement
Simulated annealing based standard cell placement for VLSI designs has long been acknowledged as a compute-intensive process. All previous work in parallel simulated annealing bas...
John A. Chandy, Prithviraj Banerjee
109
Voted
GI
2009
Springer
15 years 7 months ago
Applying Concept-Driven Engineering for Business Process Specifications
: This paper presents the principles of concept-driven engineering and the ConceptManager tool as an implementation of these principles. Concept-Driven Engineering is capable of el...
Peggy Schmidt, Marion Behrens, Sebastian Kowski
127
Voted
ATAL
2010
Springer
15 years 4 months ago
Assignment problem in requirements driven agent collaboration and its implementation
Requirements Driven Agent Collaboration (RDAC) is a mechanism where the self-interested service agents actively and autonomously search for the required services submitted by the ...
Jian Tang, Zhi Jin
IJAMC
2010
149views more  IJAMC 2010»
15 years 2 months ago
Deadline-Driven Auctions for NPC host allocation in P2P MMOGs
: This paper presents the design, implementation and evaluation of Deadline-Driven Auctions (DDA), a novel task mapping infrastructure for heterogeneous distributed environments. D...
Lu Fan, Philip W. Trinder, Hamish Taylor
IEEEIAS
2007
IEEE
15 years 10 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi