Sciweavers

8644 search results - page 24 / 1729
» On the Composition of Secure Systems
Sort
View
VIS
2004
IEEE
163views Visualization» more  VIS 2004»
14 years 8 months ago
Dispersion Simulation and Visualization For Urban Security
We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminan...
Arie E. Kaufman, Feng Qiu, Haik Lorenz, Jianning W...
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Online Video Composition System
This paper presents an information-driven online video composition system. The composition work handled by the system includes dynamically setting multiple pan/tilt/zoom (PTZ) cam...
Qiong Liu, Xiaojin Shi, Don Kimber, Frank Zhao, Fr...
OOPSLA
2009
Springer
14 years 6 days ago
The operation recorder: specifying model refactorings by-example
Predefined composite operations are handy for efficient software modeling, e.g., for the automatic execution of refactor
Petra Brosch, Martina Seidl, Konrad Wieland, Manue...
SAINT
2006
IEEE
14 years 1 months ago
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon