Sciweavers

7209 search results - page 1380 / 1442
» Software Engineering for Multi-Agent Systems
Sort
View
WSC
2007
13 years 11 months ago
The simulation power of automod
Decision making in industry continues to become more complicated. Customers are more demanding, competition is more fierce, and costs for labor and raw materials continue to rise....
Todd LeBaron, Craig Jacobsen
ATAL
2008
Springer
13 years 11 months ago
Constitutive interoperability
nts have recently emerged as a valuable abstraction for characterizing interactions among autonomous agents at the level of their business relationships. Traditionally, interopera...
Amit K. Chopra, Munindar P. Singh
CAISE
2008
Springer
13 years 11 months ago
Refactoring Process Models in Large Process Repositories
With the increasing adoption of process-aware information systems (PAIS), large process model repositories have emerged. Over time respective models have to be re-aligned to the re...
Barbara Weber, Manfred Reichert
CCS
2008
ACM
13 years 10 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
DAGSTUHL
2006
13 years 10 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
« Prev « First page 1380 / 1442 Last » Next »