Sciweavers

2196 search results - page 29 / 440
» Practical Reasoning Using Values
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
IJCAI
2003
13 years 10 months ago
Tractable Symmetry Breaking for CSPs with Interchangeable Values
Symmetry breaking in CSPs has attracted consid­ erable attention in recent years. Various general schemes have been proposed to eliminate sym­ metries during search. In general,...
Pascal Van Hentenryck, Pierre Flener, Justin Pears...
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
13 years 7 months ago
Satisfaction Meets Expectations - Computing Expected Values of Probabilistic Hybrid Systems with SMT
Stochastic satisfiability modulo theories (SSMT), which is an extension of satisfiability modulo theories with randomized quantification, has successfully been used as a symboli...
Martin Fränzle, Tino Teige, Andreas Eggers
CP
2009
Springer
14 years 9 months ago
The Complexity of Valued Constraint Models
The Valued Constraint Satisfaction Problem (VCSP) is a general framework encompassing many optimisation problems. We discuss precisely what it means for a problem to be modelled in...
Peter G. Jeavons, Stanislav Zivný