Sciweavers

2043 search results - page 318 / 409
» Reasoning About Security Models
Sort
View
100
Voted
IPPS
2009
IEEE
15 years 7 months ago
Toward adjoinable MPI
4 Automatic differentiation is the primary means of obtaining analytic5 derivatives from a numerical model given as a computer program. There-6 fore, it is an essential productivi...
Jean Utke, Laurent Hascoët, Patrick Heimbach,...
WEBDB
2009
Springer
100views Database» more  WEBDB 2009»
15 years 7 months ago
Towards Well-Behaved Schema Evolution
We study the problem of schema evolution in the RDF data model. RDF and the RDFS schema language are W3C standards for flexibly modeling and sharing data on the web. Although sch...
Rada Chirkova, George H. L. Fletcher
107
Voted
ATAL
2009
Springer
15 years 7 months ago
Like an intuitive and courteous butler: a proactive personal agent for task management
The ability to proactively offer assistance promises to make personal agents more helpful to their users. We characterize the properties desired of proactive behaviour by a person...
Neil Yorke-Smith, Shahin Saadati, Karen L. Myers, ...
DATE
2007
IEEE
223views Hardware» more  DATE 2007»
15 years 7 months ago
CARAT: a toolkit for design and performance analysis of component-based embedded systems
Solid frameworks and toolkits for design and analysis of embedded systems are of high importance, since they enable early reasoning about critical properties of a system. This pap...
Egor R. V. Bondarev, Michel R. V. Chaudron, Peter ...
ICNS
2007
IEEE
15 years 7 months ago
On Maximizing Provider Revenue in Market-Based Compute Grids
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions...
Vladimir Marbukh, Kevin Mills