Sciweavers

1301 search results - page 236 / 261
» Design and architectures for dependable embedded systems
Sort
View
WIMOB
2007
IEEE
14 years 3 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
MATES
2004
Springer
14 years 2 months ago
C-IPS: Specifying Decision Interdependencies in Negotiations
Negotiation is an important mechanism of coordination in multiagent systems. Contrary to early conceptualizations of negotiating agents, we believe that decisions regarding the neg...
Kay Schröter, Diemo Urbig
RAID
2005
Springer
14 years 2 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
14 years 4 days ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu
ICSE
2000
IEEE-ACM
14 years 10 days ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley