Sciweavers

39 search results - page 7 / 8
» A Unified Approach to Intra-domain Security
Sort
View
ENTCS
2007
105views more  ENTCS 2007»
13 years 8 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
ACSAC
1999
IEEE
14 years 23 days ago
Modular Fair Exchange Protocols for Electronic Commerce
Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and...
Holger Vogt, Henning Pagnia, Felix C. Gärtner
AGENTS
2001
Springer
14 years 29 days ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell
ISI
2004
Springer
14 years 1 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle
OOPSLA
2009
Springer
14 years 3 months ago
Towards automation of iteration planning
Iterations are time-boxed periods with an intended outcome that is often a set of implemented requirements. Iterations are part of most common software development lifecycle model...
Jonas Helming, Maximilian Koegel, Zardosht Hodaie