Sciweavers

2015 search results - page 132 / 403
» Hidden Software Capabilities
Sort
View
ICMAS
2000
13 years 11 months ago
Adaptive Agent Integration Architectures for Heterogeneous Team Members
Withthe proliferationof software agents and smart hardware devices there is a growing realization that large-scale problems can be addressed by integration of such standalone syst...
EUROMICRO
2006
IEEE
14 years 3 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
ICCS
2005
Springer
14 years 3 months ago
Model-Based Statistical Testing of a Cluster Utility
Abstract. As High Performance Computing becomes more collaborative, software certification practices are needed to quantify the credibility of shared applications. To demonstrate q...
W. Thomas Swain, Stephen L. Scott
FOAL
2007
ACM
14 years 1 months ago
On the relation of aspects and monads
The relation between aspects and monads is a recurring topic in discussions in the programming language community, although it has never been elaborated whether their resemblences...
Christian Hofer, Klaus Ostermann
ICSOC
2005
Springer
14 years 3 months ago
A Lightweight Formal Framework for Service-Oriented Applications Design
Leveraging service oriented programming paradigm would significantly affect the way people build software systems. This paper contributes to the above goal proposing a lightweigh...
Aliaksei Yanchuk, Alexander Ivanyukovich, Maurizio...