Sciweavers

10263 search results - page 2051 / 2053
» From Use Cases to System Operation Specifications
Sort
View
AI
2002
Springer
13 years 8 months ago
The influence of social norms and social consciousness on intention reconciliation
Research on resource-bounded agents has established that rational agents need to be able to revise their commitments in light of new opportunities. In the context of collaborative...
Barbara J. Grosz, Sarit Kraus, David G. Sullivan, ...
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
IJHPCA
2010
105views more  IJHPCA 2010»
13 years 7 months ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
OOPSLA
2010
Springer
13 years 7 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
RAID
2010
Springer
13 years 7 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis
« Prev « First page 2051 / 2053 Last » Next »