Sciweavers

4350 search results - page 788 / 870
» Case studies for contract-based systems
Sort
View
RAID
2004
Springer
14 years 2 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
ATAL
2003
Springer
14 years 2 months ago
Model checking agentspeak
This paper introduces AgentSpeak(F), a variation of the BDI logic programming language AgentSpeak(L) intended to permit the model-theoretic verification of multi-agent systems. A...
Rafael H. Bordini, Michael Fisher, Carmen Pardavil...
GLVLSI
2010
IEEE
164views VLSI» more  GLVLSI 2010»
14 years 1 months ago
Performance and energy trade-offs analysis of L2 on-chip cache architectures for embedded MPSoCs
On-chip memory organization is one of the most important aspects that can influence the overall system behavior in multiprocessor systems. Following the trend set by high-perform...
Mohamed M. Sabry, Martino Ruggiero, Pablo Garcia D...
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
14 years 1 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
EICS
2009
ACM
14 years 1 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...