Sciweavers

8503 search results - page 1573 / 1701
» Secure Software Architectures
Sort
View
EDBT
2010
ACM
155views Database» more  EDBT 2010»
14 years 8 days ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas
WSC
2008
13 years 11 months ago
Distributed agent-based simulation of construction projects with HLA
Simulation techniques can provide a resource-driven schedule and answer many hypothetical scenarios before project execution to improve on conventional project management software...
Hosein Taghaddos, Simaan M. AbouRizk, Yasser Moham...
ASAP
2008
IEEE
120views Hardware» more  ASAP 2008»
13 years 11 months ago
Lightweight DMA management mechanisms for multiprocessors on FPGA
This paper presents a multiprocessor system on FPGA that adopts Direct Memory Access (DMA) mechanisms to move data between the external memory and the local memory of each process...
Antonino Tumeo, Matteo Monchiero, Gianluca Palermo...
ATAL
2008
Springer
13 years 11 months ago
Goals in agent systems: a unifying framework
In the literature on agent systems, the proactive behavior of agents is often modeled in terms of goals that the agents pursue. We review a number of commonly-used existing goal t...
M. Birna van Riemsdijk, Mehdi Dastani, Michael Win...
ATAL
2008
Springer
13 years 11 months ago
LS/ABPM - an agent-powered suite for goal-oriented autonomic BPM
In this paper we shortly describe the Living Systems Autonomic Business Process Management (LS/ABPM) software product. LS/ABPM is an integrated environment, based on J2EE, Eclipse...
Giovanni Rimassa, Martin E. Kernland, Roberto Ghiz...
« Prev « First page 1573 / 1701 Last » Next »