Sciweavers

366 search results - page 23 / 74
» Modeling Requirements for Value Configuration Design
Sort
View
CCS
2010
ACM
14 years 10 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
SG
2007
Springer
15 years 6 months ago
Lighting-by-Example with Wavelets
Automatic lighting design aims to provide users with semi-automated approaches, and easy-to-use tools, to configure lighting for 3D scenes. We present LIGHTOPEX the first fully aut...
Hai Nam Ha, Patrick Olivier
JOT
2008
124views more  JOT 2008»
14 years 11 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...
MOR
2007
149views more  MOR 2007»
14 years 11 months ago
LP Rounding Approximation Algorithms for Stochastic Network Design
Real-world networks often need to be designed under uncertainty, with only partial information and predictions of demand available at the outset of the design process. The field ...
Anupam Gupta, R. Ravi, Amitabh Sinha
IAT
2008
IEEE
15 years 6 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...