Sciweavers

1352 search results - page 203 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ESOP
2010
Springer
14 years 6 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
ACSW
2006
13 years 10 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
WWW
2004
ACM
14 years 9 months ago
CTR-S: a logic for specifying contracts in semantic web services
A requirements analysis in the emerging field of Semantic Web Services (SWS) (see http://daml.org/services/swsl/requirements/) has identified four major areas of research: intelli...
Hasan Davulcu, Michael Kifer, I. V. Ramakrishnan
FC
1997
Springer
107views Cryptology» more  FC 1997»
14 years 13 days ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
AAAI
1993
13 years 10 months ago
A Method for Development of Dialogue Managers for Natural Language Interfaces
This paper describes a method for the development of dialogue managers for natural language interfaces. A dialogue manager is presented designed on the basis of both a theoretical...
Arne Jönsson