Sciweavers

1461 search results - page 228 / 293
» On Regular Reduced Products
Sort
View
AWCC
2004
Springer
14 years 1 months ago
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of informa...
Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hu...
ECAI
2004
Springer
14 years 1 months ago
Multiple Relaxations in Temporal Planning
CRIKEY is a planner that separates out the scheduling from the classical parts of temporal planning. This can be seen as a relaxation of the temporal information during the classic...
Keith Halsey, Derek Long, Maria Fox
EMSOFT
2004
Springer
14 years 1 months ago
Reuse of software in distributed embedded automotive systems
Until recently, in the automotive industry, reuse of software has entirely been a typical activity of suppliers. They try to reduce the increasing software development costs that ...
Bernd Hardung, Thorsten Kölzow, Andreas Kr&uu...
GRID
2004
Springer
14 years 1 months ago
Phoenix: Making Data-Intensive Grid Applications Fault-Tolerant
A major hurdle facing data intensive grid applications is the appropriate handling of failures that occur in the grid-environment. Implementing the fault-tolerance transparently a...
George Kola, Tevfik Kosar, Miron Livny
SEKE
2004
Springer
14 years 1 months ago
UCDA: Use Case Driven Development Assistant Tool for Class Model Generation
The development of class models using the Rational Unified Process (RUP) requires complete, correct and unambiguous use case specification documents. The Use Case Driven Developmen...
Kalaivani Subramaniam, Dong Liu, Behrouz Homayoun ...