Sciweavers

2057 search results - page 325 / 412
» Developing the Designer's Toolkit with Software Comprehensio...
Sort
View
SEKE
2005
Springer
15 years 10 months ago
Modelling Agent Knowledge with Business Rules
Multi-agent systems have become increasingly mature, but their appearance does not make the traditional OO approach obsolete. On the contrary, OO methodologies can benefit from th...
Liang Xiao 0002, Des Greer
LCPC
2004
Springer
15 years 9 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...
SOUPS
2009
ACM
15 years 11 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
ACSAC
2007
IEEE
15 years 10 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
ISSTA
2006
ACM
15 years 10 months ago
Towards self-adaptive service-oriented architectures
Web services, service-oriented, and service-discovery architectures help developers solve complex business cases, reduce costs, risks, and time-to-market. The task of developers i...
Giovanni Denaro, Mauro Pezzè, Davide Tosi, ...