Sciweavers

18924 search results - page 69 / 3785
» Conformance of Distributed Systems
Sort
View
97
Voted
DSN
2005
IEEE
15 years 8 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
134
Voted
IGPL
2010
117views more  IGPL 2010»
14 years 12 months ago
Executable specification of open multi-agent systems
Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent's internal state, are often classified as `ope...
Alexander Artikis, Marek J. Sergot
109
Voted
DSN
2006
IEEE
15 years 8 months ago
Dependability Analysis of Virtual Memory Systems
Recent research has shown that even modern hard disks have complex failure modes that do not conform to “failstop” operation. Disks exhibit partial failures like block access ...
Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusse...
ICAIL
2003
ACM
15 years 8 months ago
Developing Legal Knowledge Based Systems Through Theory Construction
Bench-Capon and Sartor have proposed that reasoning with legal cases be seen as a process of theory construction, evaluation and application. They have proposed a set of theory co...
Alison Chorley, Trevor J. M. Bench-Capon
147
Voted
AIL
2008
109views more  AIL 2008»
15 years 2 months ago
Artificial institutions: a model of institutional reality for open multiagent systems
Software agents' ability to interact within different open systems, designed by different groups, presupposes an agreement on an unambiguous definition of a set of concepts, ...
Nicoletta Fornara, Francesco Viganò, Mario ...