Sciweavers

1352 search results - page 200 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ISSRE
2005
IEEE
14 years 2 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
DEON
2010
Springer
14 years 1 months ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
CONCURRENCY
2007
83views more  CONCURRENCY 2007»
13 years 9 months ago
Enabling community access to TeraGrid visualization resources
Visualization is an important part of the data analysis process. Many researchers, however, do not have access to the resources required to do visualization effectively for large ...
Justin Binns, Jonathan DiCarlo, Joseph A. Insley, ...
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
14 years 3 months ago
Seamless Execution of Action Sequences
— One of the most notable and recognizable features of robot motion is the abrupt transitions between actions in action sequences. In contrast, humans and animals perform sequenc...
Freek Stulp, Wolfram Koska, Alexis Maldonado, Mich...
ATAL
2003
Springer
14 years 2 months ago
Multiagent diffusion and distributed optimization
Distributed problem solving by a multiagent system represents a promising approach to solving complex computational problems. However, many multiagent systems require certain degr...
Kwok Ching Tsui, Jiming Liu