Sciweavers

1235 search results - page 196 / 247
» Formalizing information security knowledge
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
13 years 6 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
WWW
2008
ACM
14 years 8 months ago
Circular context-based semantic matching to identify web service composition
This paper provides initial analysis in identifying possible Web services composition using context-based semantic matching. Context-based semantic matching allows service composi...
Aviv Segev
MOBIHOC
2009
ACM
14 years 8 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
HICSS
2008
IEEE
185views Biometrics» more  HICSS 2008»
14 years 2 months ago
Organizational Readiness for Business Process Outsourcing: A Model of Determinants and Impact on Outsourcing Success
In innovation adoption literature, the important role of the organizational context as a determinant of information systems (IS) success has long been pointed out. Various factors...
Sebastian F. Martin, Daniel Beimborn, Mihir A. Par...
GEOS
2007
Springer
14 years 1 months ago
A Location and Action-Based Model for Route Descriptions
Abstract. Representing human spatial knowledge has long been a challenging research area. The objective of this paper is to model a route description of human navigation where verb...
David Brosset, Christophe Claramunt, Eric Saux