Sciweavers

792 search results - page 155 / 159
» Mixed-initiative security agents
Sort
View
JCS
2008
119views more  JCS 2008»
13 years 7 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ATAL
2010
Springer
13 years 6 months ago
On events in multi-robot patrol in adversarial environments
The problem of multi-robot patrol in adversarial environments has been gaining considerable interest during the recent years.In this problem, a team of mobile robots is required t...
Noa Agmon
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
OOPSLA
2009
Springer
14 years 2 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
IEEEARES
2008
IEEE
14 years 2 months ago
Design of an FDB based Intra-domain Packet Traceback System
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadob...