Sciweavers

1352 search results - page 112 / 271
» Designing Security Requirements Models Through Planning
Sort
View
GLOBECOM
2009
IEEE
14 years 4 months ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...
STORYTELLING
2007
Springer
14 years 4 months ago
Wide Ruled: A Friendly Interface to Author-Goal Based Story Generation
We present Wide Ruled, an authoring tool for the creation of generative stories. It is based on the Universe author-goal-based model of story generation, and extends this model by ...
James Skorupski, Lakshmi Jayapalan, Sheena Marquez...
USITS
1997
13 years 11 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
WSC
2001
13 years 11 months ago
Production scheduling validity in high level supply chain models
Although they focus on the big picture, high level supply chain models cannot gloss over the capacity of production nodes to meet production allocations. Capacity is not simply a ...
David J. Parsons, Richard A. Phelps
ICIA
2007
14 years 12 days ago
Modeling Human-Agent Interaction with Active Ontologies
As computer systems continue to grow in power and access more networked content and services, we believe there will be an increasing need to provide more user-centric systems that...
Didier Guzzoni, Charles Baur, Adam Cheyer