Sciweavers

5722 search results - page 892 / 1145
» Security Function Interactions
Sort
View
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
15 years 8 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
TIME
2000
IEEE
15 years 8 months ago
Navigating through Hierarchical Change Propagation in Spatiotemporal Queries
In spatiotemporal applications, meaningful changes vary according to object type, level of detail, and nature of application. In this paper, we introduce a dynamic classification ...
Giorgos Mountrakis, Peggy Agouris, Anthony Stefani...
ECOOP
2000
Springer
15 years 8 months ago
On Inner Classes
Inner classes in object-oriented languages play a role similar to nested function definitions in functional languages, allowing an object to export other objects with direct acces...
Atsushi Igarashi, Benjamin C. Pierce
ATAL
1999
Springer
15 years 8 months ago
Variable Sociability in Agent-Based Decision Making
Multi-agent system research is concerned with the issues surrounding the performance of collections of interacting agents. A major concern, therefore, is with the design of the dec...
Lisa Hogg, Nicholas R. Jennings
ESEC
1999
Springer
15 years 8 months ago
The CIP Method: Component- and Model-Based Construction of Embedded Systems
CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The ...
Hugo Fierz