Sciweavers

297 search results - page 26 / 60
» Choosing a Reliable Hypothesis
Sort
View
WWW
2007
ACM
14 years 10 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
ICDCS
1995
IEEE
14 years 1 months ago
A Competitive Analysis for Retransmission Timeout
Protocols that provide reliable communicationon top of a network that can lose packets rely on periodically retransmitting packets. The choice of retransmission timeout critically...
Shlomi Dolev, Michael Kate, Jennifer L. Welch
IEEEIAS
2007
IEEE
14 years 4 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
MOBICOM
2006
ACM
14 years 3 months ago
Deployment analysis in underwater acoustic wireless sensor networks
In this paper, different deployment strategies for two-dimensional and three-dimensional communication architectures for UnderWater Acoustic Sensor Networks (UW-ASNs) are proposed...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
CEC
2005
IEEE
14 years 3 months ago
A hybrid approach to parameter tuning in genetic algorithms
Abstract- Choosing the best parameter setting is a wellknown important and challenging task in Evolutionary Algorithms (EAs). As one of the earliest parameter tuning techniques, th...
Bo Yuan, Marcus Gallagher