Sciweavers

3389 search results - page 662 / 678
» Perspectives on system identification
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
GI
2005
Springer
14 years 1 months ago
A Normative Language Approach to the Application of Petri Nets for Clinical Workflows
: This contribution discusses the application of Petri nets for modeling workflow in healthcare based on a normative language approach. After a brief inon, a framework of different...
Kamyar Sarshar, Peter Loos
ICLP
2005
Springer
14 years 1 months ago
A Generic Framework for the Analysis and Specialization of Logic Programs
The relationship between abstract interpretation and partial deduction has received considerable attention and (partial) integrations have been proposed starting from both the part...
Germán Puebla, Elvira Albert, Manuel V. Her...
INEX
2005
Springer
14 years 1 months ago
INEX 2005 Multimedia Track
In this article the activities of the INEX 2005 Multimedia track are reported. We succesfully realized our objective, to provide an evaluation platform for the evaluation of retrie...
Roelof van Zwol, Gabriella Kazai, Mounia Lalmas
VIZSEC
2005
Springer
14 years 1 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...