Sciweavers

605 search results - page 58 / 121
» A strategy for efficiently verifying requirements
Sort
View
CDVE
2007
Springer
124views Visualization» more  CDVE 2007»
14 years 3 months ago
"Integrare", a Collaborative Environment for Behavior-Oriented Design
In order to build complex, large-scale, dependable systems it is necessary to use a development environment with an integrated set of capabilities that supports editing and formal...
Lian Wen, Robert Colvin, Kai Lin, John Seagrott, N...
TON
2008
103views more  TON 2008»
13 years 9 months ago
On the race of worms, alerts, and patches
We study the effectiveness of automatic patching and quantify the speed of patch or alert dissemination required for worm containment. We focus on random scanning as this is repres...
Milan Vojnovic, Ayalvadi J. Ganesh
ESORICS
2008
Springer
13 years 11 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
DEXA
2004
Springer
129views Database» more  DEXA 2004»
14 years 2 months ago
Using Case Based Retrieval Techniques for Handling Anomalous Situations in Advisory Dialogues
The efficacy of expert systems often depends on the accuracy and completeness of the problem specification negotiated with the user. Therefore, efficient user interfaces are needed...
Marcello L'Abbate, Ingo Frommholz, Ulrich Thiel, E...
AMAI
2005
Springer
13 years 9 months ago
Auction design with costly preference elicitation
We consider auction design in a setting with costly preference elicitation. Well designed auctions can help to avoid unnecessary elicitation while determining efficient allocations...
David C. Parkes