Sciweavers

1352 search results - page 195 / 271
» Designing Security Requirements Models Through Planning
Sort
View
183
Voted
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
15 years 10 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
131
Voted
AC
2000
Springer
15 years 3 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
SOQUA
2007
15 years 4 months ago
An approach to detecting failures automatically
Failure detection is a difficult and often expensive task. The principle of self-healing addresses this cost issue, but poses new research questions. This work focuses on detectin...
Jochen Wuttke
127
Voted
EDBT
2004
ACM
115views Database» more  EDBT 2004»
16 years 3 months ago
QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases
Abstract. The paper discusses the design and prototype implementation of a QoS-aware multimedia database system. Recent research in multimedia databases has devoted little attentio...
Yi-Cheng Tu, Sunil Prabhakar, Ahmed K. Elmagarmid,...
248
Voted
AGENTS
2001
Springer
15 years 8 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe