Sciweavers

762 search results - page 45 / 153
» How to realize
Sort
View
121
Voted
ISCC
2002
IEEE
132views Communications» more  ISCC 2002»
15 years 9 months ago
An active network approach to virtual private networks
Virtual Private Networks (VPN) represent, in today’s Internet, one of the most interesting applications. This is due both to their usefulness in corporate network scenarios and ...
R. Maresca, Maurizio D'Arienzo, Marcello Esposito,...
84
Voted
CAISE
2000
Springer
15 years 8 months ago
Efficient Distributed Workflow Management Based on Variable Server Assignments
For enterprise-wide and cross-enterprise workflow (WF) applications, the load of the WF servers and the amount of communication in the subnets may become a bottleneck. This paper s...
Thomas Bauer, Peter Dadam
AAMAS
2005
Springer
15 years 3 months ago
Modular Representation of Agent Interaction Rules through Argumentation
Communication between agents needs to be flexible enough to encompass together a variety of different aspects such as, conformance to society protocols, private tactics of the indi...
Antonis C. Kakas, Nicolas Maudet, Pavlos Moraitis
128
Voted
ACTAC
2002
99views more  ACTAC 2002»
15 years 3 months ago
Recognizing Design Patterns in C++ Programs with the Integration of Columbus and Maisa
A method for recognizing design patterns from C++ programs is presented. The method consists of two separate phases, analysis and reverse engineering of the C++ code, and architec...
Rudolf Ferenc, Juha Gustafsson, Lászl&oacut...
CSCW
2002
ACM
15 years 3 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf