Sciweavers

753 search results - page 96 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 1 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
METRICS
2003
IEEE
14 years 1 months ago
When Can We Test Less?
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
ALT
1997
Springer
13 years 12 months ago
Synthesizing Noise-Tolerant Language Learners
An index for an r.e. class of languages (by definition) generates a sequence of grammars defining the class. An index for an indexed family of languages (by definition) generat...
John Case, Sanjay Jain, Arun Sharma
AAAI
2010
13 years 9 months ago
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
Recently, algorithms for computing game-theoretic solutions have been deployed in real-world security applications, such as the placement of checkpoints and canine units at Los An...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr
IADIS
2004
13 years 9 months ago
A Context Aware User Profile for Personalization
With the emergence of the first 3G mobile technologies in everyday life, mobile phones and PDAs are able to function as more than just simple means of communication. Research on t...
D. Halvatzaras, M. Howard Williams