Sciweavers

2015 search results - page 333 / 403
» Hidden Software Capabilities
Sort
View
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
14 years 5 days ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
ROBOCUP
1999
Springer
145views Robotics» more  ROBOCUP 1999»
14 years 5 days ago
5dpo-2000 Team Description
This paper briefly describes the design principles of the hardware and software of 5dpo-2000 team. An evolutive approach is presented as the robots are constantly being improved wi...
Paulo Costa, António Moreira, Armando Sousa...
AGENTS
1997
Springer
14 years 3 days ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
INFOCOM
1996
IEEE
14 years 2 days ago
Flow Labelled IP: A Connectionless Approach to ATM
A number of proposals for supporting IP over ATM are under discussion in the networking community including: LAN emulation, classical IP over ATM, routing over large clouds, and m...
Peter Newman, Thomas L. Lyon, Greg Minshall
ESEC
1997
Springer
14 years 2 days ago
Developing Multimedia Applications with the WinWin Spiral Model
Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems....
Barry W. Boehm, Alexander Egyed, Julie Kwan, Raymo...