Sciweavers

4382 search results - page 769 / 877
» Query by Semantic Example
Sort
View
ASMTA
2009
Springer
114views Mathematics» more  ASMTA 2009»
15 years 6 months ago
Improving the Efficiency of the Proxel Method by Using Individual Time Steps
Discrete stochastic models (DSM) are widely used in various application fields today. Proxel-based simulation can outperform discrete event-based approaches in the analysis of smal...
Claudia Krull, Robert Buchholz, Graham Horton
123
Voted
ATAL
2007
Springer
15 years 6 months ago
Workflow coordination for service-oriented multiagent systems
From a multiagent viewpoint, a workflow is a dynamic set of tasks performed by a set of agents to reach a shared goal. We show herein that commitments among agents can be used to ...
Jiangbo Dang, Jingshan Huang, Michael N. Huhns
ATAL
2007
Springer
15 years 6 months ago
MAGENTA technology case studies of magenta i-scheduler for road transportation
The paper describes functionality of Magenta Multi-Agent Logistics i-Scheduler Engine presented on AAMAS 2006 conferences and gives examples of its application in business domain....
Petr Skobelev, Andrey Glaschenko, Ilya Grachev, Se...
ELPUB
2007
ACM
15 years 6 months ago
Expectation and Reality in Digital Publishing: Some Australian Perspectives
This paper presents a brief summary of the findings of a Web-based survey of the views of Australian publishers, on the potential impact of digital technologies, followed by three...
Bill Martin, Hepu Deng, Xuemei Tian
116
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 6 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...