Sciweavers

7209 search results - page 1218 / 1442
» Software Engineering for Multi-Agent Systems
Sort
View
EMSOFT
2004
Springer
15 years 5 months ago
Conservative approximations for heterogeneous design
Embedded systems are electronic devices that function in the context of a real environment, by sensing and reacting to a set of stimuli. Because of their close interaction with th...
Roberto Passerone, Jerry R. Burch, Alberto L. Sang...
ICFEM
2004
Springer
15 years 5 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...
101
Voted
EUROSYS
2010
ACM
15 years 5 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
COMPSAC
2009
IEEE
15 years 5 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
98
Voted
SEKE
2009
Springer
15 years 5 months ago
Improving Searchability of a Music Digital Library with Semantic Web Technologies
—Traditional search systems are usually based on keywords, a very simple and convenient mechanism to express a need for information. This is the most extended way of searching th...
Paloma de Juan, Carlos Angel Iglesias
« Prev « First page 1218 / 1442 Last » Next »