Sciweavers

2335 search results - page 422 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
HASE
2002
IEEE
15 years 6 months ago
Coyote: An XML-Based Framework for Web Services Testing
Web services received significant attention recently and several important web service platforms such as .NET are now available. The testing and evaluation of web services are imp...
Wei-Tek Tsai, Raymond A. Paul, Weiwei Song, Zhibin...
SMC
2010
IEEE
276views Control Systems» more  SMC 2010»
15 years 3 hour ago
A Modified Invasive Weed Optimization Algorithm for training of feed- forward Neural Networks
— Invasive Weed Optimization Algorithm IWO) is an ecologically inspired metaheuristic that mimics the process of weeds colonization and distribution and is capable of solving mul...
Ritwik Giri, Aritra Chowdhury, Arnob Ghosh, Swagat...
EMSOFT
2004
Springer
15 years 7 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
RECSYS
2009
ACM
15 years 8 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
CHI
2009
ACM
16 years 2 months ago
The mousegrip
Computer games, often played with others, are a compelling pastime for many. However, they have been criticized for their mouse and keyboard or gamepad interactions, as they suppo...
Florian Mueller, Martin R. Gibbs, Frank Vetere