Sciweavers

1996 search results - page 50 / 400
» Financial Theory 2
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
CCE
2010
13 years 7 months ago
Green process design, green energy, and sustainability: A systems analysis perspective
This paper presents a systems analysis perspective that extends the traditional process design framework to green process design, green energy and industrial ecology leading to su...
Urmila M. Diwekar, Yogendra N. Shastri
RTA
2010
Springer
14 years 1 months ago
Computing Critical Pairs in 2-Dimensional Rewriting Systems
Rewriting systems on words are very useful in the study of monoids. In good cases, they give finite presentations of the monoids, allowing their manipulation by a computer. Even b...
Samuel Mimram
P2P
2008
IEEE
102views Communications» more  P2P 2008»
14 years 4 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
OWLED
2008
13 years 11 months ago
Representing Product Designs Using a Description Graph Extension to OWL 2
Product development requires the ability to check design consistency, to verify design properties, and to answer questions about a design's possible implementations. These tas...
Henson Graves