Sciweavers

1059 search results - page 198 / 212
» Modeling Security Protocols as Games
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
EATIS
2007
ACM
13 years 11 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
COMCOM
2006
93views more  COMCOM 2006»
13 years 7 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
PPDP
2005
Springer
14 years 1 months ago
ReactiveML: a reactive extension to ML
We present ReactiveML, a programming language dedicated to the implementation of complex reactive systems as found in graphical user interfaces, video games or simulation problems...
Louis Mandel, Marc Pouzet