Sciweavers

268 search results - page 41 / 54
» Towards ontology-driven development of applications for smar...
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 2 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
14 years 2 months ago
A Petri net-based approach to QoS-aware configuration for web services
: With the development of enterprise-wide and cross-enterprise application integration and interoperation towards web service, web service providers try to not only fulfill the fun...
PengCheng Xiong, Yushun Fan, MengChu Zhou
GCC
2007
Springer
14 years 1 months ago
A Resource-based Reputation Rating Mechanism for Peer-to-Peer Networks
As various kinds of peer-to-peer (P2P) applications become popular and widely known to people all around the world, research on P2P networks has received considerable interest. Re...
Huan Chen, Guihai Chen
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolutionary computation methods for synchronization of effects based operations
Effects based operations (EBO) is a concept based on the premise that a desired strategic outcome can be achieved through synergistic, multiplicative, and cumulative application ...
Jeffrey P. Ridder
AAAI
2007
13 years 10 months ago
RETALIATE: Learning Winning Policies in First-Person Shooter Games
In this paper we present RETALIATE, an online reinforcement learning algorithm for developing winning policies in team firstperson shooter games. RETALIATE has three crucial chara...
Megan Smith, Stephen Lee-Urban, Hector Muño...