Sciweavers

2940 search results - page 79 / 588
» Behavioral Constraints for Services
Sort
View
MIDDLEWARE
2005
Springer
14 years 3 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan
ISCC
2003
IEEE
14 years 3 months ago
Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
ADAEUROPE
2001
Springer
14 years 2 months ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde
AMET
1998
Springer
14 years 2 months ago
Agent-Mediated Integrative Negotiation for Retail Electronic Commerce
Software agents help automate a variety of tasks including those involved in buying and selling products over the Internet. Although shopping agents provide convenience for consume...
Robert H. Guttman, Pattie Maes
AMET
1998
Springer
14 years 2 months ago
Bid Evaluation and Selection in the MAGNET Automated Contracting System
We present an approach to the bid-evaluation problem in a system for multi-agent contract negotiation, called MAGNET. The MAGNET market infrastructure provides support for a variet...
Erik S. Steinmetz, John Collins, Scott Jamison, Ra...