Sciweavers

50 search results - page 10 / 10
» Abstract specification of legal contracts
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 2 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
AAAI
1994
13 years 8 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
DAGSTUHL
2006
13 years 8 months ago
Hierarchies Relating Topology and Geometry
Cognitive Vision has to represent, reason and learn about objects in its environment it has to manipulate and react to. There are deformable objects like humans which cannot be des...
Walter G. Kropatsch, Yll Haxhimusa, Pascal Lienhar...
INTERNET
2002
145views more  INTERNET 2002»
13 years 7 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
CASCON
2010
204views Education» more  CASCON 2010»
13 years 2 months ago
Effective collaboration and consistency management in business process modeling
ion and giving them a medium to express and implement change. One of the keys to achieve agility for creating business processes depends on close interaction between IT department ...
Moises Castelo Branco, Yingfei Xiong, Krzysztof Cz...