Sciweavers

1352 search results - page 195 / 271
» Designing Security Requirements Models Through Planning
Sort
View
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
14 years 3 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
AC
2000
Springer
13 years 8 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
SOQUA
2007
13 years 10 months ago
An approach to detecting failures automatically
Failure detection is a difficult and often expensive task. The principle of self-healing addresses this cost issue, but poses new research questions. This work focuses on detectin...
Jochen Wuttke
EDBT
2004
ACM
115views Database» more  EDBT 2004»
14 years 9 months ago
QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases
Abstract. The paper discusses the design and prototype implementation of a QoS-aware multimedia database system. Recent research in multimedia databases has devoted little attentio...
Yi-Cheng Tu, Sunil Prabhakar, Ahmed K. Elmagarmid,...
AGENTS
2001
Springer
14 years 1 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe