Sciweavers

489 search results - page 74 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
ICAI
2003
13 years 11 months ago
Collaborative Agents for C2 Teamwork Simulation
– Existing team training software often requires that trainees be organized as physical teams and the members of the same team be trained at the same time. To demonstrate that te...
Dianxiang Xu, Michael S. Miller, Richard A. Volz, ...
IJISEC
2007
149views more  IJISEC 2007»
13 years 10 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
ISSTA
2009
ACM
14 years 5 months ago
Loop-extended symbolic execution on binary programs
Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including securityrelevant ones. However, existing symbolic execution...
Prateek Saxena, Pongsin Poosankam, Stephen McCaman...
GIS
2005
ACM
14 years 11 months ago
Monitoring dynamic spatial fields using responsive geosensor networks
Information about dynamic spatial fields, such as temperature, windspeed, or the concentration of gas pollutant in the air, is important for many environmental applications. At th...
Matt Duckham, Silvia Nittel, Michael F. Worboys
IMC
2004
ACM
14 years 3 months ago
A pragmatic approach to dealing with high-variability in network measurements
The Internet is teeming with high variability phenomena, from measured IP flow sizes to aspects of inferred router-level connectivity, but there still exists considerable debate ...
Walter Willinger, David Alderson, Lun Li