Sciweavers

293 search results - page 47 / 59
» A Logical Approach to Multilevel Security of Probabilistic S...
Sort
View
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
POPL
2004
ACM
14 years 8 months ago
Simple relational correctness proofs for static analyses and program transformations
We show how some classical static analyses for imperative programs, and the optimizing transformations which they enable, may be expressed and proved correct using elementary logi...
Nick Benton
HICSS
2005
IEEE
223views Biometrics» more  HICSS 2005»
14 years 1 months ago
Intelligent Agent Supported Business Process Management
The complex business environment requires managing business processes with the ability to adapt to changes and to collaborate in activities. Conventional workflow approaches based...
Minhong Wang, Huaiqing Wang
SDMW
2004
Springer
14 years 1 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
AO
2007
144views more  AO 2007»
13 years 8 months ago
Social acquisition of ontologies from communication processes
This work introduces a formal framework for the social acquisition of ontologies which are constructed dynamically from overhearing the possibly conflicting symbolic interaction o...
Matthias Nickles