Sciweavers

350 search results - page 12 / 70
» Practices of stigmergy in architectural work
Sort
View
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
15 years 8 months ago
Fault-tolerant formations of mobile robots
—The goal of a robot formation control architecture is to get a number of robots into a specified form. To be effective and practical, the control architecture must be able to tr...
Ross Mead, Robert Long, Jerry B. Weinberg
PERCOM
2007
ACM
16 years 1 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
ICSE
2004
IEEE-ACM
16 years 1 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda
139
Voted
SOFTVIS
2010
ACM
15 years 7 days ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
120
Voted
CDES
2008
90views Hardware» more  CDES 2008»
15 years 3 months ago
Nanocompilation for the Cell Matrix Architecture
- The Cell Matrix Architecture is a massive array of dynamically self-configurable, uniformly connected, identical computational units. This architecture can enable efficient, prac...
Thomas Way, Rushikesh Katikar, Ch. Purushotham