Sciweavers

371 search results - page 31 / 75
» Adaptation hiding modularity
Sort
View
120
Voted
ICWS
2010
IEEE
15 years 5 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...
145
Voted
ICALP
2007
Springer
15 years 5 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
124
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
103
Voted
HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
15 years 9 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
176
Voted
PDCAT
2004
Springer
15 years 9 months ago
Parallel Computing Platform for the Agent-Based Modeling of Multicellular Biological Systems
Abstract. Agent-based simulation of large multicellular biological systems has become a viable option owing to affordable parallel computers, such as Beowulf-style clusters. We de...
Toh Da-Jun, Francis Tang, Travis Lee, Deepak Sarda...