Sciweavers

1348 search results - page 5 / 270
» Keynote Address I
Sort
View
WCRE
2006
IEEE
14 years 1 months ago
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations
In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heurist...
Lionel C. Briand
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
MICRO
2002
IEEE
117views Hardware» more  MICRO 2002»
13 years 7 months ago
Generating physical addresses directly for saving instruction TLB energy
Power consumption and power density for the Translation Lookaside Buffer (TLB) are important considerations not only in its design, but can have a consequence on cache design as w...
Ismail Kadayif, Anand Sivasubramaniam, Mahmut T. K...
DIGRA
2005
Springer
14 years 1 months ago
Addressing social dilemmas and fostering cooperation through computer games
The concept of social dilemmas can be used to understand social situations all around us. I am looking at identity formation to help understand why people make the decisions they ...
Mark Chen
ATAL
2003
Springer
14 years 21 days ago
Distribution of goals addressed to a group of agents
The problem investigated in this paper is the distribution of goals addressed to a group of rational agents. Those agents are characterized by their ability (i.e. what they can do...
Laurence Cholvy, Christophe Garion