Sciweavers

2357 search results - page 376 / 472
» Computing Refactorings of Behavior Models
Sort
View
142
Voted
EUROPAR
2004
Springer
15 years 7 months ago
Large-Scale Deployment in P2P Experiments Using the JXTA Distributed Framework
The interesting properties of P2P systems (high availability despite peer volatility, support for heterogeneous architectures, high scalability, etc.) make them attractive for dist...
Gabriel Antoniu, Luc Bougé, Mathieu Jan, S&...
ACMICEC
2007
ACM
220views ECommerce» more  ACMICEC 2007»
15 years 6 months ago
Asymptotically optimal repeated auctions for sponsored search
We investigate asymptotically optimal keyword auctions, that is, auctions which maximize revenue as the number of bidders grows. We do so under two alternative behavioral assumpti...
Nicolas S. Lambert, Yoav Shoham
CE
2008
122views more  CE 2008»
15 years 2 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
156
Voted
LICS
2009
IEEE
15 years 9 months ago
The Structure of First-Order Causality
Game semantics describe the interactive behavior of proofs by interpreting formulas as games on which proofs induce strategies. Such a semantics is introduced here for capturing d...
Samuel Mimram
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw