Sciweavers

511 search results - page 53 / 103
» Computational aspects of the FLBC framework
Sort
View
ICPPW
2009
IEEE
13 years 6 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
CAV
2006
Springer
95views Hardware» more  CAV 2006»
14 years 20 days ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
AGS
2009
Springer
14 years 3 months ago
Two Case Studies for Jazzyk BSM
Recently, we introduced Behavioural State Machines (BSM ), a novel programming framework for development of cognitive agents with Jazzyk, its associated programming language and in...
Michael Köster, Peter Novák, David Mai...
ISPDC
2005
IEEE
14 years 2 months ago
Designing Agent Based Travel Support System
Online travel support systems have often been cited as an ideal proving ground for agent-based architectures, yet no working systems have materialized. Over the last few years we ...
Minor Gordon, Marcin Paprzycki
GCC
2004
Springer
14 years 2 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou