Sciweavers

WETICE
1999
IEEE
13 years 11 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
WETICE
1999
IEEE
13 years 11 months ago
Here Is the Knowledge-Where Should I Put It?
In order to design useful knowledge media spaces to knowledge workers it is essential that we understand the nature of the work conducted and the knowledge applied in real setting...
Peter H. Carstensen, Ulrika Snis
ISADS
1999
IEEE
13 years 11 months ago
Autonomous Decentralized System with Event Service for Information Services
Autonomous Decentralized System (ADS) has the properties of online expansion, online maintenance and fault tolerance, which are among the important features for next generation in...
Stephen S. Yau, Ning Dong, Fariaz Karim
ISADS
1999
IEEE
13 years 11 months ago
Distributed Component-based Tailorability for CSCW Applications
Tailorability is generally regarded as a key property of groupware systems due to the dynamics and diversity of cooperative work. This article investigates the use of software com...
Oliver Stiemerling, Ralph Hinken, Armin B. Cremers
ISADS
1999
IEEE
13 years 11 months ago
Emergence of Communication for Negotiation by a Recurrent Neural Network
We believe that communication in multi-agent system has two major meanings. One of them is to transmit one agent's observed information to the other. The other meaning is to ...
Katsunari Shibata, Koji Ito
ISADS
1999
IEEE
13 years 11 months ago
Fault Tolerance in Decentralized Systems
: In a decentralised system the problems of fault tolerance, and in particular error recovery, vary greatly depending on the design assumptions. For example, in a distributed datab...
Brian Randell
ISADS
1999
IEEE
13 years 11 months ago
CORBA based Architecture for Large Scale Workflow
Standard client-server workflow management systems have an intrinsic scalability limitation, the central server, which represents a bottleneck for large-scale applications. This s...
Roberto Silveira Silva Filho, Jacques Wainer, Edmu...
ISADS
1999
IEEE
13 years 11 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CANDC
1999
ACM
13 years 11 months ago
Integrating craft materials and computation
Traditionally, the notion of home crafting connotes the use of "low-tech" materials and techniques; but increasingly, the once-distinct worlds of crafting and computatio...
Glenn Blauvelt, Thomas Wrensch, Michael Eisenberg
CANDC
1999
ACM
13 years 11 months ago
A framework that supports collective creativity in design using visual images
The goal of our research is to develop computer systems that support designers’ collective creativity; such systems support individual creative aspects in design through the use...
Kumiyo Nakakoji, Yasuhiro Yamamoto, Masao Ohira