This paper provides some results and analysis of several negotiation algorithms. We have used a tournament-based approach to evaluation and applied this within a community of Buyers and Sellers in a simulated car hire...
详细信息
The increasing complexity, heterogeneity and dynamism of networks, systems, services applications have made our computational/information infrastructure brittle, unmanageable and insecure. This has necessitated the in...
详细信息
The devices in an ad hoc network are expected to perform network functionalities by themselves due to the absence of proper networking infrastructure. Generally the routing is multi-hop as nodes may not be within the ...
详细信息
Many statechart-based testing strategies result in specifying a set of paths to be executed through a (flattened) statechart. These techniques can usually be easily automated so that the tester does not have to go thr...
详细信息
This paper outlines a body of work that tries to merge polynomial model selection research and tropical cyclone forecasting research. The contributions of the work are four-fold. First, a new criterion based on the Mi...
详细信息
The usual approach to dealing with imperfections in data is to attempt to eliminate them. However, the nature of modern systems means this is often futile. This paper describes an approach which permits applications t...
详细信息
This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f...
详细信息
A great benefit of software inspections is that they can be applied at almost any stage of the software development life cycle. We document a large-scale experiment conducted during an entity relationship (ER) model i...
详细信息
暂无评论