Sciweavers

2105 search results - page 240 / 421
» Grouping with Directed Relationships
Sort
View
ETRICS
2006
14 years 2 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
ACSAC
2001
IEEE
14 years 2 months ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
CAV
2000
Springer
125views Hardware» more  CAV 2000»
14 years 2 months ago
Efficient Reachability Analysis of Hierarchical Reactive Machines
Hierarchical state machines is a popular visual formalism for software specifications. To apply automated analysis to such specifications, the traditional approach is to compile th...
Rajeev Alur, Radu Grosu, Michael McDougall
DESRIST
2009
Springer
135views Education» more  DESRIST 2009»
14 years 2 months ago
Towards a design theory for online communities
Online communities are increasingly important in modern social life. Yet, the diverse collection of guidelines that have directed online community design may not be keeping pace w...
David Gurzick, Wayne G. Lutters
COORDINATION
2008
Springer
14 years 17 days ago
How to Infer Finite Session Types in a Calculus of Services and Sessions
Abstract. The notion of session is fundamental in service oriented applications, as it separates interactions between different instances of the same service, and it groups togethe...
Leonardo Gaetano Mezzina