Sciweavers

762 search results - page 122 / 153
» How to realize
Sort
View
EDBT
2009
ACM
186views Database» more  EDBT 2009»
15 years 10 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...
143
Voted
CEC
2009
IEEE
15 years 10 months ago
Evolving morphology and control: A distributed approach
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
Mariagiovanna Mazzapioda, Angelo Cangelosi, Stefan...
139
Voted
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
143
Voted
ROBOCUP
2007
Springer
159views Robotics» more  ROBOCUP 2007»
15 years 10 months ago
Model Checking Hybrid Multiagent Systems for the RoboCup
Abstract. This paper shows how multiagent systems can be modeled by a combination of UML statecharts and hybrid automata. This allows formal system cation on different levels of ab...
Ulrich Furbach, Jan Murray, Falk Schmidsberger, Fr...
SOUPS
2006
ACM
15 years 10 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten