Sciweavers

26354 search results - page 131 / 5271
» How we refactor, and how we know it
Sort
View
IAT
2009
IEEE
14 years 5 months ago
How Do Agents Comply with Norms?
—The import of the notion of institution in the design of MASs requires to develop formal and efficient methods for modeling the interaction between agents’ behaviour and norm...
Guido Governatori, Antonino Rotolo
IEEESCC
2006
IEEE
14 years 4 months ago
Control the Flow: How to Safely Compose Streaming Services into Business Processes
Although workflow languages are widely used for composing discrete services, these are not suitable for stream based interactions. In this paper we address the problem of how to ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
HICSS
2005
IEEE
182views Biometrics» more  HICSS 2005»
14 years 3 months ago
How the Semantic Web is Being Used: An Analysis of FOAF Documents
— Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships invo...
Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi
EUROCRYPT
2001
Springer
14 years 2 months ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
WOSP
2000
ACM
14 years 2 months ago
How system architectures impede interoperability
Interoperability problems arise when complex software systems are constructed by integrating distinct, and often heterogeneous, components. By performing interoperability analysis...
Leigh A. Davis, Jamie Payton, Rose F. Gamble