Sciweavers

973 search results - page 123 / 195
» Arguing Using Opponent Models
Sort
View
MONTEREY
2007
Springer
14 years 1 months ago
Logic-Based Regulatory Conformance Checking
In this paper, we describe an approach to formally assess whether an organization conforms to a body of regulation. Conformance is cast as a model checking question where the regul...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
14 years 1 months ago
Offshore Outsourcing: Counteracting Forces and Their Dynamic Effects
Many argue that offshoring is an inexorable trend since IT skills have become a global commodity and they are vastly cheaper in other parts of the world. According to this view, m...
Amitava Dutta, Rahul Roy
TSD
2005
Springer
14 years 1 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
EDCC
2008
Springer
13 years 9 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger