Sciweavers

1981 search results - page 301 / 397
» The State of Change: A Survey
Sort
View
ADHOCNOW
2003
Springer
14 years 3 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ASM
2003
ASM
14 years 3 months ago
An ASM Semantics of UML Derived from the Meta-model and Incorporating Actions
We present an approach towards a formal dynamic semantics for UML using ASM. We aim to remain as close as possible to the standard definition of UML and to cover the operational pa...
Ileana Ober
ATAL
2003
Springer
14 years 3 months ago
Synchronous versus asynchronous collaboration in situated multi-agent systems
According to the taxonomy for agent activity, proposed by V. Parunak, a collaboration is an interaction between agents of a multi-agent system (MAS) whereby the agents explicitly ...
Danny Weyns, Tom Holvoet
DEXA
2003
Springer
222views Database» more  DEXA 2003»
14 years 3 months ago
Process Data Store: A Real-Time Data Store for Monitoring Business Processes
With access to real-time information on critical performance indicators of business processes, managers and staff members can play a crucial role in improving the speed and effecti...
Josef Schiefer, Beate List, Robert M. Bruckner
EDBTW
2010
Springer
14 years 3 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner