Sciweavers

3555 search results - page 549 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IPTPS
2003
Springer
15 years 9 months ago
Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks
Considerable research effort has recently been devoted to the design of structured peer-to-peer overlays, a term we use to encompass Content-Addressable Networks (CANs), Distribut...
Sean C. Rhea, Timothy Roscoe, John Kubiatowicz
DESRIST
2009
Springer
132views Education» more  DESRIST 2009»
15 years 8 months ago
Outline of a design science research process
Discussions about the body of knowledge of information systems, including the research domain, relevant perspectives and methods have been going on for a long time. Many researche...
Philipp Offermann, Olga Levina, Marten Schönh...
163
Voted
AGENTS
2001
Springer
15 years 8 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
160
Voted
BIOWIRE
2007
Springer
15 years 8 months ago
An Artificial Chemistry for Networking
Chemical computing models have been proposed since the 1980ies for expressing concurrent computations in elegant ways for shared memory systems. In this paper we look at the distri...
Thomas Meyer, Lidia Yamamoto, Christian F. Tschudi...
CHI
2007
ACM
15 years 8 months ago
Making mashups with marmite: towards end-user programming for the web
There is a tremendous amount of web content available today, but it is not always in a form that supports end-users' needs. In many cases, all of the data and services needed...
Jeffrey Wong, Jason I. Hong