Sciweavers

1398 search results - page 115 / 280
» The Real World Software Process
Sort
View
IEEEARES
2009
IEEE
14 years 3 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
14 years 2 months ago
An estimation of distribution algorithm with guided mutation for a complex flow shop scheduling problem
An Estimation of Distribution Algorithm (EDA) is proposed to approach the Hybrid Flow Shop with Sequence Dependent Setup Times and Uniform Machines in parallel (HFSSDST-UM) proble...
Abdellah Salhi, José Antonio Vázquez...
OTM
2007
Springer
14 years 2 months ago
Browsing Semantics in Context-Aware Mobile Hypermedia
Mobile hypermedia applications combine the well-known advantages of the navigational paradigm of the Web with the capabilities of location-aware software. However, there are some s...
Cecilia Challiol, Agustin Muñoz, Gustavo Ro...
ATAL
2004
Springer
14 years 1 months ago
Demonstrating Social Error Recovery with AgentFactory
In real world applications, agents - be they software agents or autonomous robots - inevitably face erroneous situations that have not been planned for. Re-planning can sometimes ...
Robert J. Ross, Rem W. Collier, Gregory M. P. O'Ha...
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
14 years 1 months ago
Emergent Structures in Supply Chains - A Study Integrating Agent-Based and System Dynamics Modeling
Supply chain management is a demanding and complicated task due to its broad scope and the strong connectedness of its objects and issues. In order to make theoretical investigati...
Nadine Schieritz, Andreas Größler