Sciweavers

8492 search results - page 1587 / 1699
» Modelling and Design of Multi-Agent Systems
Sort
View
ETRICS
2006
14 years 17 days ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FASE
2006
Springer
14 years 16 days ago
Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude
This paper describes the application of the Real-Time Maude tool to the formal specification and analysis of the CASH scheduling algorithm and its suggested modifications. The CASH...
Peter Csaba Ölveczky, Marco Caccamo
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 16 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
ICAIL
1995
ACM
14 years 13 days ago
Automated Legislative Drafting: Generating Paraphrases of Legislation
In this paper, we describe which roles deep structures of law play in (automatic) drafting legislation. Deep structures contain a formal description of the intended normative effe...
Radboud Winkels, Nienke den Haan
UIST
1995
ACM
14 years 12 days ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
« Prev « First page 1587 / 1699 Last » Next »