Sciweavers

2205 search results - page 325 / 441
» Mutation Operators for Specifications
Sort
View
168
Voted
DSOM
2008
Springer
15 years 4 months ago
Web-Based Management of Content Delivery Networks
Abstract overlay networks have been considered enablers of efficient management for decentralized, large scale service deployments. A Content Delivery Network (CDN) is an example o...
George C. Oikonomou, Theodore K. Apostolopoulos
DSVIS
2008
Springer
15 years 4 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
ECAI
2008
Springer
15 years 4 months ago
An Empirical Investigation of the Adversarial Activity Model
Multiagent research provides an extensive literature on formal Belief-Desire-Intention (BDI) based models describing the notions of teamwork and cooperation, but adversarial and c...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
EUC
2008
Springer
15 years 4 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
119
Voted
IE
2007
15 years 4 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton