Sciweavers

950 search results - page 97 / 190
» presence 2008
Sort
View
JSAC
2008
95views more  JSAC 2008»
14 years 9 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JSS
2008
89views more  JSS 2008»
14 years 9 months ago
A search-based framework for automatic testing of MATLAB/Simulink models
Search-based test-data generation has proved successful for code-level testing but almost no search-based work has been carried out at evels of abstraction. In this paper the appl...
Yuan Zhan, John A. Clark
DKE
2007
131views more  DKE 2007»
14 years 9 months ago
Reasoning and change management in modular ontologies
ct 9 The benefits of modular representations are well known from many areas of computer science. While in software engi10 neering modularization is mainly a vehicle for supporting...
Heiner Stuckenschmidt, Michel C. A. Klein
JTAER
2008
103views more  JTAER 2008»
14 years 9 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
JUCS
2008
109views more  JUCS 2008»
14 years 9 months ago
Extending and Supporting Featured User Interface Models for the Development of Groupware Applications
: This paper presents a proposal to tackle the design and development of user interfaces for groupware applications. This proposal includes important design and implementation issu...
Victor M. Ruiz Penichet, María Dolores Loza...