Sciweavers

1307 search results - page 218 / 262
» Conceptual models: begin by designing what to design
Sort
View
WWW
2010
ACM
14 years 2 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
CCS
2004
ACM
14 years 1 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ATAL
2006
Springer
13 years 11 months ago
Agent interaction in distributed POMDPs and its implications on complexity
The ability to coordinate effectively is critical for agents to accomplish their goals in a multi-agent system. A number of researchers have modeled the coordination problem for m...
Jiaying Shen, Raphen Becker, Victor R. Lesser
WSC
2000
13 years 9 months ago
Using simulation to analyze supply chains
Supply Chain management, the management of the flow of goods or services from materials stage to the end user, is a complex process because of the level of uncertainty at each sta...
Daniel W. Schunk, Beth M. Plott
BIRTHDAY
2010
Springer
14 years 20 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem