Sciweavers

10159 search results - page 1844 / 2032
» System Design Validation Using Formal Models
Sort
View
WCRE
2005
IEEE
15 years 7 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
AOSE
2005
Springer
15 years 7 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
CSCW
2004
ACM
15 years 7 months ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin
149
Voted
ISORC
2003
IEEE
15 years 7 months ago
A Dynamic Shadow Approach for Mobile Agents to Survive Crash Failures
Fault tolerance schemes for mobile agents to survive agent server crash failures are complex since developers normally have no control over remote agent servers. Some solutions mo...
Simon Pears, Jie Xu, Cornelia Boldyreff
ICRA
1998
IEEE
110views Robotics» more  ICRA 1998»
15 years 6 months ago
Control of a Bow Leg Hopping Robot
The bow leg hopper is a new design for a locomoting system with a resilient, flexible leg. It features a passive stance phase and natural pitch stability. It is controlled with ac...
Ben Brown, Garth Zeglin
« Prev « First page 1844 / 2032 Last » Next »