Sciweavers

86 search results - page 5 / 18
» Implementing Policy Management through BDI
Sort
View
FLAIRS
2003
13 years 9 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson
IM
2007
13 years 9 months ago
Autonomic Management of Component-Based Embedded Software
Abstract— Software components embedded in ubiquitous systems, especially those using wireless networking, are subject to unpredictable behaviors inherent to using these systems i...
Fabien Romeo, Franck Barbier, Jean-Michel Bruel
SOUPS
2005
ACM
14 years 1 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 2 months ago
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Tara Leweling, Otto Sieber
IFIP
2004
Springer
14 years 1 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...