Sciweavers

501 search results - page 78 / 101
» Access control and key management for mobile agents
Sort
View
WWW
2006
ACM
14 years 9 months ago
Model-based version and configuration management for a web engineering lifecycle
During a lifecycle of a large-scale Web application, Web developers produce a wide variety of inter-related Web objects. Following good Web engineering practice, developers often ...
Tien Nhut Nguyen
MANSCI
2007
86views more  MANSCI 2007»
13 years 8 months ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
GECCO
2010
Springer
170views Optimization» more  GECCO 2010»
14 years 1 months ago
Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution
Technology scaling has offered advantages to embedded systems, such as increased performance, more available memory and reduced energy consumption. However, scaling also brings a...
José Manuel Colmenar, José L. Risco-...
INFOCOM
2006
IEEE
14 years 2 months ago
A Framework for Distributed Spatio-Temporal Communications in Mobile Ad Hoc Networks
— Space-time communications can help combat fading and hence can significantly increase the capacity of ad hoc networks. Cooperative diversity or virtual antenna arrays facilita...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...
ITICSE
1997
ACM
14 years 1 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom