Sciweavers

8469 search results - page 1523 / 1694
» An Agent-Environment Interaction Model
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 8 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
WETICE
1998
IEEE
15 years 8 months ago
Workgroup Middleware for Distributed Projects*
We have developed a middleware framework for workgroup environments that can support distributed software development and a variety of other application domains requiring document...
Gail E. Kaiser, Stephen E. Dossick
ACISP
1998
Springer
15 years 8 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
VRML
1998
ACM
15 years 8 months ago
3D Product Presentation Online: The Virtual Design Exhibition
VRML offers a high potential for product presentation: Instead of regarding flat, static pictures, configurable and animated 3D models embedded in entertaining environments provid...
J. Dauner, Jürgen Landauer, E. Stimpfig, D. R...
ICSE
1998
IEEE-ACM
15 years 8 months ago
What You See Is What You Test: A Methodology for Testing Form-Based Visual Programs
Form-based visual programming languages, which include commercial spreadsheets and various research systems, have had a substantial impact on end-user computing. Research shows, h...
Gregg Rothermel, Lixin Li, Christopher DuPuis, Mar...
« Prev « First page 1523 / 1694 Last » Next »