Sciweavers

1809 search results - page 331 / 362
» A Formal Specification of dMARS
Sort
View
ASE
2005
103views more  ASE 2005»
13 years 9 months ago
Component Verification with Automatically Generated Assumptions
Abstract. Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. The typical approach to verifying propertie...
Dimitra Giannakopoulou, Corina S. Pasareanu, Howar...
TKDE
2008
177views more  TKDE 2008»
13 years 9 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TSMC
2008
229views more  TSMC 2008»
13 years 9 months ago
A Comprehensive Survey of Multiagent Reinforcement Learning
Multiagent systems are rapidly finding applications in a variety of domains, including robotics, distributed control, telecommunications, and economics. The complexity of many task...
Lucian Busoniu, Robert Babuska, Bart De Schutter
CSSE
2004
IEEE
13 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DEBU
2002
107views more  DEBU 2002»
13 years 9 months ago
Exploiting Web Service Semantics: Taxonomies vs. Ontologies
Comprehensive semantic descriptions of Web services are essential to exploit them in their full potential, that is, discovering them dynamically, and enabling automated service ne...
Asuman Dogac, Gokce Laleci, Yildiray Kabak, Ibrahi...