Sciweavers

3104 search results - page 110 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
146
Voted
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 10 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
229
Voted
ICAC
2009
IEEE
15 years 10 months ago
Run-time correlation engine for system monitoring and testing
We present an approach and implementation for run-time correlation of large volumes of log data and symptom matching of know issues in the context of large enterprise applications...
Viliam Holub, Trevor Parsons, Patrick O'Sullivan, ...
134
Voted
ATAL
2005
Springer
15 years 9 months ago
Liberalizing protocols for argumentation in multi-agent systems
This publication summarizes research on the the design and implementation of liberalized version of existing truth-finding protocols for argumentation, such as the standard two-a...
Gerard Vreeswijk
135
Voted
PROMAS
2004
Springer
15 years 9 months ago
Goal Representation for BDI Agent Systems
Abstract. Agent-oriented system development aims to simplify the conn of complex systems by introducing a natural abstraction layer on top of the object-oriented paradigm composed ...
Lars Braubach, Alexander Pokahr, Daniel Moldt, Win...
176
Voted
AIMS
2008
Springer
15 years 10 months ago
A Theory of Closure Operators
We explore how fixed-point operators can be designed to interact and be composed to form autonomic control mechanisms. We depart from the idea that an operator is idempotent only ...
Alva L. Couch, Marc Chiarini