Sciweavers

1818 search results - page 363 / 364
» How users use access control
Sort
View
WACC
1999
ACM
14 years 8 hour ago
Building a federation of process support systems
The effort in software process support has focused so far on modeling and enacting processes. A certain amount of work has been done, but little has reached a satisfactory level o...
Jacky Estublier, Mahfoud Amiour, Samir Dami
TPHOL
1999
IEEE
13 years 12 months ago
Three Tactic Theorem Proving
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Don Syme
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 6 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
BMCBI
2008
128views more  BMCBI 2008»
13 years 7 months ago
HAPSIMU: a genetic simulation platform for population-based association studies
Background: Population structure is an important cause leading to inconsistent results in population-based association studies (PBAS) of human diseases. Various statistical method...
Feng Zhang, Jianfeng Liu, Jie Chen, Hong-Wen Deng
IRES
2002
63views more  IRES 2002»
13 years 7 months ago
The Semantic Web, universalist ambition and some lessons from librarianship
Building the semantic web encounters problems similar to building large bibliographic systems. The experience of librarianship in controlling large, heterogeneous collections of b...
Terrence A. Brooks