Sciweavers

1090 search results - page 177 / 218
» A Replicated Monitoring Tool
Sort
View
RE
2005
Springer
14 years 2 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ATAL
2005
Springer
14 years 2 months ago
MAGENTA technology: multi-agent systems for industrial logistics
We introduce MAGENTA’s commercial multi-agent systems technology, and illustrate its practical use by describing a field-tested application in the area of logistics/scheduling....
Jonathan Himoff, Petr Skobelev, Michael Wooldridge
ICCBR
2005
Springer
14 years 2 months ago
Autonomous Internal Control System for Small to Medium Firms
Small to medium enterprises require an internal control mechanism in order to monitor their modus operandi and to analyse whether they are achieving their goals. A tool for the dec...
María Lourdes Borrajo Diz, Juan M. Corchado...
IMC
2004
ACM
14 years 2 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis
NETGAMES
2004
ACM
14 years 2 months ago
Some thoughts on emulating jitter for user experience trials
It is usually hard to control the network conditions affecting public online game servers when studying the impact of latency, loss and jitter on user experience. This leads to a ...
Grenville J. Armitage, Lawrence Stewart