Sciweavers

1963 search results - page 283 / 393
» How is aliasing used in systems software
Sort
View
ATAL
2009
Springer
14 years 3 months ago
Bounded practical social reasoning in the ESB framework
Reasoning about others, as performed by agents in order to coordinate their behaviours with those of others, commonly involves forming and updating beliefs about hidden system pro...
Iain Wallace, Michael Rovatsos
FTDCS
2003
IEEE
14 years 2 months ago
Dynamic Component Composition for Functionality Adaptation in Pervasive Environments
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
HICSS
2007
IEEE
98views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Tool for Training and Assistance in Emergency Response Planning
This paper presents research on developing a new type of software tool for training and assisting the personnel in emergency response planning. The tool, called Disciple-VPT, will...
Gheorghe Tecuci, Mihai Boicu, Thomas Hajduk, Dorin...
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
14 years 2 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba