Sciweavers

422 search results - page 36 / 85
» On Exploiting Agent Technology in the Design of Peer-to-Peer...
Sort
View
ICWE
2005
Springer
14 years 2 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek
CIKM
2010
Springer
13 years 7 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu
IADIS
2004
13 years 10 months ago
Dynamic Configuration of a Personalized Tourist Agenda
In this paper we claim that the new generation of Web-based systems should offer an intelligent, flexible and interactive support to their users, coupled with the ability to provi...
Anna Goy, Diego Magro
AAAI
2007
13 years 11 months ago
Synthesis of Constraint-Based Local Search Algorithms from High-Level Models
The gap in automation between MIP/SAT solvers and those for constraint programming and constraint-based local search hinders experimentation and adoption of these technologies and...
Pascal Van Hentenryck, Laurent D. Michel
WWW
2003
ACM
14 years 9 months ago
SweetDeal: representing agent contracts with exceptions using XML rules, ontologies, and process descriptions
SweetDeal is a rule-based approach to representation of business contracts that enables software agents to create, evaluate, negotiate, and execute contracts with substantial auto...
Benjamin N. Grosof, Terrence C. Poon