Sciweavers

3555 search results - page 558 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
144
Voted
CSE
2009
IEEE
15 years 10 months ago
A Design Methodology for Self-Management in Distributed Environments
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...
SEFM
2007
IEEE
15 years 10 months ago
Automatically Proving Concurrent Programs Correct
of abstract interpretations in formal methods It is always very satisfying to hear about a theory, in the case at hand it is the theory of abstract interpretations, that explains i...
Byron Cook
138
Voted
ATAL
2005
Springer
15 years 9 months ago
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems. The following are key drivers...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
APNOMS
2006
Springer
15 years 7 months ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi
AVI
2004
15 years 5 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...