Sciweavers

846 search results - page 133 / 170
» Separating Designs from Implementations: Role-Based Software...
Sort
View
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
14 years 10 months ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
IEEESCC
2010
IEEE
14 years 11 months ago
BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications
Service-orientation and object-oriented design are common practice in the field of business application development. Business process execution languages help to facilitate the orc...
Marvin Ferber, Thomas Rauber, Sascha Hunold
DAC
2007
ACM
16 years 2 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
SENSYS
2006
ACM
15 years 7 months ago
The tenet architecture for tiered sensor networks
Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or mo...
Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, ...
ESAW
2009
Springer
15 years 8 months ago
Incorporating BDI Agents into Human-Agent Decision Making Research
Artificial agents, people, institutes and societies all have the ability to make decisions. Decision making as a research area therefore involves a broad spectrum of sciences, ran...
Bart Kamphorst, Arlette van Wissen, Virginia Dignu...