Sciweavers

1631 search results - page 274 / 327
» Extreme Programming - Back to Basics
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Belief operations for motivated BDI agents
The beliefs of an agent reflecting her subjective view of the world constitute one of the main components of a BDI agent. In order to incorporate new information coming from other...
Patrick Krümpelmann, Matthias Thimm, Manuela ...
CC
2008
Springer
13 years 12 months ago
Generating SIMD Vectorized Permutations
Abstract. This paper introduces a method to generate efficient vectorized implementations of small stride permutations using only vector load and vector shuffle instructions. These...
Franz Franchetti, Markus Püschel
DMS
2008
132views Multimedia» more  DMS 2008»
13 years 11 months ago
STRAT: a Sketched-truss Recognition and Analysis Tool
The statically-determinate, pin-connected truss is a basic structural element used by engineers to create larger and more complex systems. Truss analysis and design are topics tha...
Joshua M. Peschel, Tracy Anne Hammond
ICWS
2008
IEEE
13 years 11 months ago
Extending WS-Notification with an Expressive Event Notification Broker
Web service applications integrate explicit client-service interactions with notification-style programming. Such event-driven interactions are often called implicit invocations b...
Sven De Labey, Eric Steegmans
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 11 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol