Sciweavers

4330 search results - page 757 / 866
» Analyzing security architectures
Sort
View
128
Voted
IDEAL
2005
Springer
15 years 9 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
112
Voted
ATAL
2005
Springer
15 years 9 months ago
The DEFACTO system for human omnipresence to coordinate agent teams: the future of disaster response
Enabling interactions of agent-teams and humans is a critical area of research, with encouraging progress in the past few years. However, previous work suffers from three key lim...
Nathan Schurr, Janusz Marecki, N. Kasinadhuni, Mil...
136
Voted
APLAS
2004
ACM
15 years 9 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas
138
Voted
DOLAP
2004
ACM
15 years 9 months ago
Experimental evidence on partitioning in parallel data warehouses
Parallelism can be used for major performance improvement in large Data warehouses (DW) with performance and scalability challenges. A simple low-cost shared-nothing architecture ...
Pedro Furtado
131
Voted
MM
2004
ACM
146views Multimedia» more  MM 2004»
15 years 9 months ago
"living-room": interactive, space-oriented augmented reality
living-room is an augmented reality (AR) installation developed to study interactive, space-oriented AR-scenarios. The installation consists of the living-room box, a room that is...
Roderick Galantay, Jan Torpus, Maia Engeli