Sciweavers

6907 search results - page 945 / 1382
» Securing distributed adaptation
Sort
View
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
119
Voted
COMPSAC
2002
IEEE
15 years 8 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
15 years 8 months ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
123
Voted
OOPSLA
2009
Springer
15 years 8 months ago
Software evolution and the moving picture metaphor
Software systems evolve over time. Currently we do not do a good job of documenting this evolution. This essay discusses the need to better document software evolution and introdu...
Mark Mahoney
TOOLS
2000
IEEE
15 years 8 months ago
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration
The success of distributed object technology, depends on the advent of Object Request Broker (ORB) architectures that are able to integrate flexible support for various nonfunctio...
Bo Nørregaard Jørgensen, Eddy Truyen...