Sciweavers

4890 search results - page 951 / 978
» From system specifications to component behavioral models
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ECRA
2002
113views more  ECRA 2002»
13 years 8 months ago
A European perspective towards online one-stop government: the eGOV project
E-Government reflects current visions for public administrations towards modernization and reorganization. Thereof, online one-stop Government targets the improvement of customer-...
Maria Wimmer
CIKM
2006
Springer
14 years 17 days ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
MBEES
2008
13 years 10 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...
ATAL
2010
Springer
13 years 10 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...