Sciweavers

1734 search results - page 118 / 347
» What works
Sort
View
SAC
2003
ACM
14 years 2 months ago
Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms
Researchers building multi-agent algorithms typically work with abstracted away from real applications. The abstracted problem instances allow systematic and detailed investigatio...
Paul Scerri, Pragnesh Jay Modi, Wei-Min Shen, Mili...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
14 years 2 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
GECCO
2003
Springer
14 years 2 months ago
Selection Intensity in Asynchronous Cellular Evolutionary Algorithms
Abstract. This paper presents a theoretical study of the selection pressure in asynchronous cellular evolutionary algorithms (cEAs). This work is motivated by the search for a gene...
Mario Giacobini, Enrique Alba, Marco Tomassini
DESRIST
2009
Springer
132views Education» more  DESRIST 2009»
14 years 1 months ago
Outline of a design science research process
Discussions about the body of knowledge of information systems, including the research domain, relevant perspectives and methods have been going on for a long time. Many researche...
Philipp Offermann, Olga Levina, Marten Schönh...
PROFES
2009
Springer
14 years 1 months ago
The Waterfall Model in Large-Scale Development
Waterfall development is still a widely used way of working in software development companies. Many problems have been reported related to the model. Commonly accepted problems are...
Kai Petersen, Claes Wohlin, Dejan Baca