Sciweavers

1998 search results - page 349 / 400
» Situated Control Rules
Sort
View
127
Voted
IAT
2005
IEEE
15 years 9 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
IEEESCC
2005
IEEE
15 years 9 months ago
An ECA Rule-based Workflow Design Tool for Shanghai Grid
Service integration, the ultimate goal of Shanghai Grid, has created a necessity for more efficient and effective workflow infrastructure. Workflow design tool is one core compone...
Lin Chen, Minglu Li, Jian Cao, Yi Wang
152
Voted
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
15 years 9 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
105
Voted
ISPW
2005
IEEE
15 years 9 months ago
Project Management System Based on Work-Breakdown-Structure Process Model
: We have developed a “WBS(Work Breakdown Structure) process model” for a business application software development project. We have also developed a project management system ...
Akira Harada, Satoshi Awane, Yuji Inoya, Osamu Ohn...
IHIS
2005
ACM
15 years 9 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao