Sciweavers

653 search results - page 111 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
AUTONOMICS
2008
ACM
13 years 9 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
LCPC
2009
Springer
14 years 9 days ago
A Communication Framework for Fault-Tolerant Parallel Execution
PC grids represent massive computation capacity at a low cost, but are challenging to employ for parallel computing because of variable and unpredictable performance and availabili...
Nagarajan Kanna, Jaspal Subhlok, Edgar Gabriel, Es...
ATAL
2005
Springer
14 years 1 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards
PADL
2001
Springer
14 years 5 days ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
SIGUCCS
2005
ACM
14 years 1 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson