Sciweavers

4445 search results - page 180 / 889
» Reflective Authorization Systems
Sort
View
ISTA
2007
15 years 6 months ago
Integrating Manufacturing System Simulation Development A methodological framework
: Today, discrete-event simulation (DES) use in the manufacturing industry has become widespread, but far from all companies use this technology.Often simulation is used on a `one-...
Jamal Mtaawa, Zidan Basher
EPEW
2010
Springer
15 years 5 months ago
Composing Systems While Preserving Probabilities
Abstract. Restricting the power of the schedulers that resolve the nondeterminism in probabilistic concurrent systems has recently drawn the attention of the research community. Th...
Sonja Georgievska, Suzana Andova
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 4 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
JSW
2008
130views more  JSW 2008»
15 years 4 months ago
A Constraint-Driven Executable Model of Dynamic System Reconfiguration
Dynamic system reconfiguration techniques are presented that can enable the systematic evolution of software systems due to unanticipated changes in specification or requirements. ...
D'Arcy Walsh, Francis Bordeleau, Bran Selic
JNCA
2006
114views more  JNCA 2006»
15 years 4 months ago
An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system
We have developed and integrated software agents with two educational groupware systems (TeamWave Workplace and FLE), using evolutionary prototyping and empiricalbased design as d...
Anders I. Mørch, Jan A. Dolonen, Jan Eirik ...