Sciweavers

8928 search results - page 1668 / 1786
» Modeling Current Events
Sort
View
DAGSTUHL
2007
15 years 4 months ago
Exploiting the ASM method within the Model-driven Engineering paradigm
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...
Angelo Gargantini, Elvinia Riccobene, Patrizia Sca...
DAGSTUHL
2008
15 years 4 months ago
Interactive Multiobjective Optimization Using a Set of Additive Value Functions
Abstract. In this chapter, we present a new interactive procedure for multiobjective optimization, which is based on the use of a set of value functions as a preference model built...
José Rui Figueira, Salvatore Greco, Vincent...
NSDI
2010
15 years 4 months ago
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services
: Making cloud services responsive is critical to providing a compelling user experience. Many largescale sites, including LinkedIn, Digg and Facebook, address this need by deployi...
Atul Adya, John Dunagan, Alec Wolman
129
Voted
SIMUTOOLS
2008
15 years 4 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...
CSREASAM
2006
15 years 4 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
« Prev « First page 1668 / 1786 Last » Next »