Sciweavers

237 search results - page 47 / 48
» Modeling Mental States in Agent-Oriented Requirements Engine...
Sort
View
FSTTCS
2003
Springer
14 years 19 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
CLADE
2003
IEEE
14 years 21 days ago
vGrid: A Framework For Building Autonomic Applications
With rapid technological advances in network infrastructure, programming languages, compatible component interfaces and so many more areas, today the computational Grid has evolve...
Bithika Khargharia, Salim Hariri, Manish Parashar,...
WSC
2004
13 years 8 months ago
An Urban Terrain Abstraction to Support Decisionmaking Using Recursive Simulation
Recursive simulation is the technique of having simulated decisionmakers themselves use simulation to inform their decisionmaking. Issues of efficiency require that the recursive ...
John B. Gilmer Jr.
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
13 years 5 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...