Sciweavers

SAC
2002
ACM
13 years 11 months ago
Decision tree classification of spatial data streams using Peano Count Trees
Many organizations have large quantities of spatial data collected in various application areas, including remote sensing, geographical information systems (GIS), astronomy, compu...
Qiang Ding, Qin Ding, William Perrizo
SAC
2002
ACM
13 years 11 months ago
A multi-agent system architecture for coordination of just-in-time production and distribution
A multi-agent system architecture for coordination of just-in-time production and distribution is presented. The problem to solve is two-fold: first the right amount of resources ...
Paul Davidsson, Fredrik Wernstedt
SAC
2002
ACM
13 years 11 months ago
An evolutionary algorithm for reducing integrated-circuit test application time
The cost for testing integrated circuits represents a growing percentage of the total cost for their production. The former strictly depends on the length of the test session, and...
Fulvio Corno, Matteo Sonza Reorda, Giovanni Squill...
SAC
2002
ACM
13 years 11 months ago
A parallel index for semistructured data
Brian F. Cooper, Neal Sample, Moshe Shadmon
SAC
2002
ACM
13 years 11 months ago
Coordination middleware for XML-centric applications
This paper focuses on coordination middleware for distributed applications based on active documents and XML technologies. It introduces the main concepts underlying active docume...
Paolo Ciancarini, Robert Tolksdorf, Franco Zambone...
SAC
2002
ACM
13 years 11 months ago
Emergent situations in interactive storytelling
Interactive storytelling can either be based on explicit plot representations or on the autonomous behaviour of artificial characters. In such a character-based approach, the dyna...
Marc Cavazza, Fred Charles, Steven J. Mead
SAC
2002
ACM
13 years 11 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
SAC
2002
ACM
13 years 11 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...