Sciweavers

1352 search results - page 30 / 271
» Designing Security Requirements Models Through Planning
Sort
View
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
14 years 17 days ago
The Planet Method for Designing Relationships in B2B E-commerce
Business to Business (B2B) relationships in Ecommerce are becoming increasingly important. However, there is little guidance available for managers about how relationships should ...
Alistair G. Sutcliffe, Norma Lammont
BXML
2004
13 years 9 months ago
Telephony Interface of the ExtraPlanT Multi-agent Production Planning System
: ExtraPlanT system is a multi-agent production planning system designed for small factories, which needs to react quickly on market changes. To deal with this requirement, ExtraPl...
Petr Becvár, Michal Pechoucek, Lubos Sm&iac...
TIFS
2008
149views more  TIFS 2008»
13 years 7 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
DSN
2005
IEEE
14 years 1 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
ATAL
2011
Springer
12 years 7 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...