Sciweavers

1734 search results - page 118 / 347
» What works
Sort
View
SAC
2003
ACM
15 years 10 months ago
Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms
Researchers building multi-agent algorithms typically work with abstracted away from real applications. The abstracted problem instances allow systematic and detailed investigatio...
Paul Scerri, Pragnesh Jay Modi, Wei-Min Shen, Mili...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
15 years 10 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
GECCO
2003
Springer
15 years 10 months ago
Selection Intensity in Asynchronous Cellular Evolutionary Algorithms
Abstract. This paper presents a theoretical study of the selection pressure in asynchronous cellular evolutionary algorithms (cEAs). This work is motivated by the search for a gene...
Mario Giacobini, Enrique Alba, Marco Tomassini
DESRIST
2009
Springer
132views Education» more  DESRIST 2009»
15 years 9 months ago
Outline of a design science research process
Discussions about the body of knowledge of information systems, including the research domain, relevant perspectives and methods have been going on for a long time. Many researche...
Philipp Offermann, Olga Levina, Marten Schönh...
PROFES
2009
Springer
15 years 9 months ago
The Waterfall Model in Large-Scale Development
Waterfall development is still a widely used way of working in software development companies. Many problems have been reported related to the model. Commonly accepted problems are...
Kai Petersen, Claes Wohlin, Dejan Baca