Sciweavers

3053 search results - page 495 / 611
» A Logic of Abstract Argumentation
Sort
View
ICCS
2009
Springer
14 years 3 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
TAP
2009
Springer
178views Hardware» more  TAP 2009»
14 years 3 months ago
Dynamic Symbolic Execution for Testing Distributed Objects
Abstract. This paper extends dynamic symbolic execution to distributed and concurrent systems. Dynamic symbolic execution can be used in software testing to systematically identify...
Andreas Griesmayer, Bernhard K. Aichernig, Einar B...
FGCN
2008
IEEE
132views Communications» more  FGCN 2008»
14 years 3 months ago
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the ...
Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto
SYNASC
2008
IEEE
274views Algorithms» more  SYNASC 2008»
14 years 3 months ago
Verbalising R2ML Rules into SBVR
Nowadays, business rules receive a lot of attention from both industry and academia, as they are considered the ideal vehicle for capturing business logic. The purpose of our pape...
Oana Nicolae, Gerd Wagner
VTC
2008
IEEE
129views Communications» more  VTC 2008»
14 years 3 months ago
On Parallelizing the CryptMT Stream Cipher
Abstract—Fast stream ciphers are used extensively for encrypted data transmission in mobile networks and over multigigabit links. CryptMT, a recently proposed stream cipher, is o...
Deian Stefan, David B. Nummey, Jared Harwayne-Gida...