Sciweavers

6834 search results - page 112 / 1367
» The Fail-Heterogeneous Architectural Model
Sort
View
103
Voted
AAI
2000
118views more  AAI 2000»
15 years 3 months ago
Vivid Agents: Theory, Architecture, and Applications
Vivid agents [48] are software-controlled systems whose state comprises the mental components of knowledge, perceptions, tasks, and intentions, and whose behaviour is represented ...
Michael Schroeder, Gerd Wagner
TRUSTBUS
2010
Springer
15 years 1 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
139
Voted
IJWMC
2007
84views more  IJWMC 2007»
15 years 3 months ago
Towards all-IP wireless networks: architectures and resource management mechanism
Future wireless Internet will consist of different wireless technologies that should operate together in an efficient way to provide seamless connectivity to mobile users. The in...
Majid Ghaderi, Raouf Boutaba
FTDCS
1997
IEEE
15 years 7 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
EUROMICRO
1996
IEEE
15 years 7 months ago
Behaviour-Preserving Transformations in SHE: A Formal Approach to Architecture Design
SHE (Software/Hardware Engineering) is an objectoriented analysis, specification and design method for complex reactive hardware/software systems. SHE is based on the formal speci...
Jeroen Voeten, P. H. A. van der Putten, M. P. J. S...