Sciweavers

2747 search results - page 49 / 550
» Network externalities in software systems
Sort
View
TR
2008
98views more  TR 2008»
13 years 8 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
IPPS
2010
IEEE
13 years 6 months ago
Operating system resource management
From the point of view of an operating system, a computer is managed and optimized in terms of the application programming model and the management of system resources. For the TF...
Burton Smith
WICSA
2004
13 years 10 months ago
Software Architecture for Mobile Distributed Computing
Today's wireless networks and devices support the dynamic composition of mobile distributed systems, according to device connectivity. This has in particular led to the
Valérie Issarny, Ferda Tartanoglu, Jinshan ...
SMARTNET
2000
13 years 10 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou
ATAL
2009
Springer
14 years 1 months ago
GDT4MAS: an extension of the GDT model to specify and to verify MultiAgent systems
The Goal Decomposition Tree model has been introduced in 2005 by Mermet et al. [9] to specify and verify the behaviour of an agent evolving in a dynamic environment. This model pr...
Bruno Mermet, Gaële Simon