Sciweavers

484 search results - page 57 / 97
» Caching function calls using precise dependencies
Sort
View
IAT
2007
IEEE
14 years 4 months ago
Negotiation Dynamics: Analysis, Concession Tactics, and Outcomes
Given that a negotiation outcome is determined to a large extent by the successive offers exchanged by negotiating agents, it is useful to analyze dynamic patterns of the bidding,...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
SACMAT
2006
ACM
14 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
TRIDENTCOM
2008
IEEE
14 years 4 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
SCM
2003
13 years 11 months ago
Integrating Software Construction and Software Deployment
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
Eelco Dolstra
AINA
2005
IEEE
14 years 3 months ago
Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network
Streaming video is a key functionality in Internet based services such as distant education, VoD etc.,. The high bandwidth requirements associated with such applications coupled w...
K. Kalapriya, S. K. Nandy