Sciweavers

62 search results - page 8 / 13
» Evaluating fragment construction policies for SDT systems
Sort
View
MODELS
2007
Springer
14 years 1 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
ASIACRYPT
2000
Springer
13 years 12 months ago
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government
We will describe the outline of the cryptographic technology evaluation project in Japan and those present conditions. The purpose of this project is that the cyptographic technolo...
Hideki Imai, Atsuhiro Yamagishi
CJ
2004
141views more  CJ 2004»
13 years 7 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini
ICLP
2007
Springer
13 years 11 months ago
Web Sites Verification: An Abductive Logic Programming Tool
We present the CIFFWEB system, an innovative tool for the verification of web sites, relying upon abductive logic programming. The system allows the user to define rules that a web...
Paolo Mancarella, Giacomo Terreni, Francesca Toni
WSC
2000
13 years 9 months ago
Look-ahead strategies for controlling batch operations in industry: overview, comparison and exploration
Batching jobs in a manufacturing system is a very common policy in most industries. The main reasons for batching are avoidance of set ups and/or facilitation of material handling...
Durk-Jouke van der Zee