Sciweavers

1528 search results - page 22 / 306
» Implementing Generalized Operator Overloading
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CONEXT
2009
ACM
13 years 8 months ago
PACMAN: a platform for automated and controlled network operations and configuration management
The lack of automation associated with network operations in general and network configuration management in particular, is widely recognized as a significant contributing factor ...
Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der M...
WSC
1996
13 years 8 months ago
Scalable simulation models for construction operations
Construction operations are often repetitive not only in terms of time (the same tasks are performed over and over) but also in terms of space (the same tasks are repeated at seve...
Photios G. Ioannou, Julio C. Martínez
COR
2008
86views more  COR 2008»
13 years 6 months ago
Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, ...
Jonathan P. Caulkins, Dieter Grass, Gustav Feichti...
EPIA
2009
Springer
14 years 1 months ago
A Logic Programming System for Evolving Programs with Temporal Operators
Logic Programming Update Languages were proposed as an extension of logic programming that allows modeling the dynamics of knowledge bases where both extensional (facts) and intent...
José Júlio Alferes, Alfredo Gabaldon...