Sciweavers

1352 search results - page 66 / 271
» Designing Security Requirements Models Through Planning
Sort
View
JMLR
2008
141views more  JMLR 2008»
13 years 8 months ago
Accelerated Neural Evolution through Cooperatively Coevolved Synapses
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
IROS
2009
IEEE
177views Robotics» more  IROS 2009»
14 years 3 months ago
A learning approach to integration of layers of a hybrid control architecture
— Hybrid deliberative-reactive control architectures are a popular and effective approach to the control of robotic navigation applications. However, the design of said architect...
Matthew Powers, Tucker R. Balch
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CSFW
2009
IEEE
14 years 3 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 3 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal