Sciweavers

1106 search results - page 200 / 222
» Automated Design of Security Protocols
Sort
View
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
14 years 3 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
WECWIS
2003
IEEE
82views ECommerce» more  WECWIS 2003»
14 years 3 months ago
Property Propagation Rules for Prioritizing and Synchronizing Trading Activities
With the growing number of marketplaces and trading partners in the e–commerce environment, software tools designed to act on behalf of human traders are increasingly used to au...
Yain-Whar Si, David Edmond, Arthur H. M. ter Hofst...
CAISE
2004
Springer
14 years 1 months ago
Enhancing Application Interoperability and Enabling B2B Transactions over the Internet for Small and Medium Enterprises: The PRA
Abstract. The paper presents an approach towards executing transactions between enterprises, governmental bodies and banking institutions, based on ERP applications connected over ...
Yannis Charalabidis, Stelios Pantelopoulos
AAMAS
2000
Springer
13 years 9 months ago
Rational Coordination in Multi-Agent Environments
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents, and present a framework that uses this paradigm t...
Piotr J. Gmytrasiewicz, Edmund H. Durfee
WCRE
2010
IEEE
13 years 8 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...