Sciweavers

5722 search results - page 975 / 1145
» Security Function Interactions
Sort
View
107
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
An approach to benchmarking configuration complexity
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity o...
Aaron B. Brown, Joseph L. Hellerstein
146
Voted
SIGSOFT
2004
ACM
15 years 9 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
110
Voted
AOSE
2004
Springer
15 years 9 months ago
A Metamodel for Agents, Roles, and Groups
Societies need patterned behavior to exist. Large-scale agent societies may contain a diversity of agents, each with differing abilities and functionalities. When such an agent sys...
James Odell, Marian H. Nodine, Renato Levy
CAISE
2004
Springer
15 years 9 months ago
Agents to foster conscious design and reuse in architecture
In architecture companies, work is very often performed by several individuals. From conceptual design to the construction of a final product, the object passes through many hands,...
Daniel Pinho, Adriana Santarosa Vivacqua, Sé...
88
Voted
DNA
2004
Springer
15 years 9 months ago
DNA-Based Computation Times
Abstract. Speed of computation and power consumption are the two main parameters of conventional computing devices implemented in microelectronic circuits. As performance of such d...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Petar...