Sciweavers

4595 search results - page 816 / 919
» Reasoning about Plans
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
IJWIS
2007
153views more  IJWIS 2007»
13 years 8 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 8 months ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann
GIS
2002
ACM
13 years 8 months ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
GIS
1998
ACM
13 years 8 months ago
Mean-Variance Analysis of the Performance of Spatial Ordering Methods
Geographical Information Systems (GIS) involve the manipulation of large spatial data sets, and the performance of these systems is often determined by how these data sets are orga...
Akhil Kumar, Waleed A. Muhanna, Raymond A. Patters...