Sciweavers

1418 search results - page 46 / 284
» How to Explain Mistakes
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
13 years 8 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
CTW
2002
74views more  CTW 2002»
13 years 8 months ago
Nine Steps to Move Forward from Error
: Following celebrated failures stakeholders begin to ask questions about how to improve the systems and processes they operate, manage or depend on. In this process it is easy to ...
David D. Woods, Richard I. Cook
JAIS
2002
120views more  JAIS 2002»
13 years 8 months ago
Information Exchange Between Humanitarian Organizations: Using the XML Schema IDML
This article explains challenges that arise when humanitarian organizations want to coordinate their development activities by means of distributed information systems. It focuses...
Stefan Hüsemann
IJON
1998
95views more  IJON 1998»
13 years 8 months ago
Self-organization and segmentation in a laterally connected orientation map of spiking neurons
The RF-SLISSOM model integrates two separate lines of research on computational modeling of the visual cortex. Laterally connected self-organizing maps have been used to model how...
Yoonsuck Choe, Risto Miikkulainen
TOSEM
2002
69views more  TOSEM 2002»
13 years 8 months ago
Mixin layers: an object-oriented implementation technique for refinements and collaboration-based designs
A "refinement" is a functionality addition to a software project that can affect multiple dispersed implementation entities (functions, classes, etc.). In this paper, we...
Yannis Smaragdakis, Don S. Batory