Sciweavers

1769 search results - page 27 / 354
» An implementation of argument based discussion
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
Design and Implementation of a Content-Aware Switch Using a Network Processor
Cluster based server architectures have been widely used as a solution to overloading in web servers because of their cost effectiveness, scalability and reliability. A content aw...
Li Zhao, Yan Luo, Laxmi N. Bhuyan, Ravishankar R. ...
ECIS
2011
12 years 7 months ago
Analyzing best practice and critical success factors in a health information system case - are there any shortcuts to successful
This paper discusses critical success factors (CSF) and best practice in relation to IT implementation in the health sector. We have studied a University Hospital’s implementati...
Karin Axelsson, Ulf Melin, Fredrik Söderstr&o...
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 6 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
EASSS
2001
Springer
14 years 2 days ago
Automated Negotiation and Decision Making in Multiagent Environments
This paper presents some of the key techniques for reaching agreements in multi-agent environments. It discusses game-theory and economics based techniques: strategic negotiation, ...
Sarit Kraus
ICST
2010
IEEE
13 years 6 months ago
Characterizing the Chain of Evidence for Software Safety Cases: A Conceptual Model Based on the IEC 61508 Standard
— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzade...