This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
Abstract—Managing group membership in an ad hoc mcommerce trading forum is a challenging task as peers may only have partial knowledge of the current membership due to frequent n...
This paper describes how cognitive modeling can be exploited in the design of software agents that support naval training sessions. The architecture, specifications, and embedding...
Willem A. van Doesburg, Annerieke Heuvelink, Egon ...
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...