Sciweavers

1923 search results - page 345 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
GECCO
2007
Springer
142views Optimization» more  GECCO 2007»
15 years 3 months ago
Simulations of egoistic and altruistic behaviors using the vidya multiagent system platform
This paper investigates the impacts of individual egoistic and altruistic behaviors in a virtual society built upon the Vidya game, used here as the social simulation and Multiage...
Marcelo Souza Pita, Fernando Buarque de Lima Neto
ACMSE
2004
ACM
15 years 3 months ago
Mapping component specifications to Enterprise JavaBeans implementations
Component-based software development has become an important approach to building complex software systems. Much research focuses on component specification to achieve the advanta...
Yi Liu, H. Conrad Cunningham
107
Voted
ICSOC
2004
Springer
15 years 3 months ago
Automated composition of e-services: lookaheads
The e-services paradigm promises to enable rich, flexible, and dynamic inter-operation of highly distributed, heterogeneous networkenabled services. Among the challenges, a funda...
Cagdas Evren Gerede, Richard Hull, Oscar H. Ibarra...
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
14 years 9 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
CORR
2008
Springer
111views Education» more  CORR 2008»
14 years 9 months ago
Linear-Time Algorithms for Geometric Graphs with Sublinearly Many Crossings
We provide linear-time algorithms for geometric graphs with sublinearly many crossings. That is, we provide algorithms running in O(n) time on connected geometric graphs having n ...
David Eppstein, Michael T. Goodrich, Darren Strash