Sciweavers

1502 search results - page 286 / 301
» The new face of war
Sort
View
AAAI
2006
13 years 9 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CMG
2003
13 years 9 months ago
Men are From Mars, Women Are From Venus, Web Services are From Betelgeuse
Having trouble making robust legacy applications talk to hot new Web applications? Trying to manage business transactions with your partners when everyone is running their proprie...
Denise P. Kalm, Annie W. Shum
DAIS
2003
13 years 9 months ago
DataWarp: Building Applications Which Make Progress in an Inconsistent World
Some of the data available to today’s enterprise applications is inconsistent. This is an inevitable consequence of data being distributed and partially replicated in many locati...
Peter Henderson, Robert John Walters, Stephen Crou...
AIPS
2000
13 years 9 months ago
On-line Scheduling via Sampling
1 We consider the problem of scheduling an unknown sequence of tasks for a single server as the tasks arrive with the goal off maximizing the total weighted value of the tasks serv...
Hyeong Soo Chang, Robert Givan, Edwin K. P. Chong
WSC
1998
13 years 9 months ago
Implementing the Theory of Constraints Philosophy in Highly Reentrant Systems
A significant challenge in implementing the Theory of Constraints in the semiconductor industry is the complex and reentrant nature of the manufacturing process. Managing a constr...
Clay Rippenhagen, Shekar Krishnaswamy