Sciweavers

4998 search results - page 857 / 1000
» The case for intentional networking
Sort
View
AOSE
2005
Springer
14 years 2 months ago
Using the Analytic Hierarchy Process for Evaluating Multi-Agent System Architecture Candidates
Abstract. Although much effort has been spent on suggesting and implementing new architectures of Multi-Agent Systems (MAS), the evaluation and comparison of these has often been d...
Paul Davidsson, Stefan J. Johansson, Mikael Svahnb...
BPM
2005
Springer
118views Business» more  BPM 2005»
14 years 2 months ago
Applying Enterprise Models to Design Cooperative Scientific Environments
Scientific experiments are supported by activities that create, use, communicate and distribute information whose organizational dynamics is similar to processes performed by distr...
Andrea Bosin, Nicoletta Dessì, Maria Grazia...
CBSE
2005
Springer
14 years 2 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
DSOM
2005
Springer
14 years 2 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 2 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar