Sciweavers

396 search results - page 52 / 80
» Argument Controlled Profiling
Sort
View
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
14 years 2 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ICRA
2007
IEEE
117views Robotics» more  ICRA 2007»
14 years 2 months ago
Integration of Coordination Mechanisms in the BITE Multi-Robot Architecture
— Recent years are seeing a renewed interest in general multi-robot architectures, capable of automating coordination. However, few architectures explore integration of multiple ...
Gal A. Kaminka, Inna Frenkel
CCS
2007
ACM
14 years 1 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
GECCO
2007
Springer
200views Optimization» more  GECCO 2007»
14 years 1 months ago
Performance analysis of niching algorithms based on derandomized-ES variants
A survey of niching algorithms, based on 5 variants of derandomized Evolution Strategies (ES), is introduced. This set of niching algorithms, ranging from the very first derandom...
Ofer M. Shir, Thomas Bäck
OOPSLA
2007
Springer
14 years 1 months ago
Inferring aliasing and encapsulation properties for java
There are many proposals for language techniques to control aliasing and encapsulation in object oriented programs, typically based on notions of object ownership and pointer uniq...
Kin-Keung Ma, Jeffrey S. Foster