Sciweavers

1027 search results - page 182 / 206
» Representing and Reasoning with Operational Semantics
Sort
View
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
13 years 6 days ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
ATAL
2009
Springer
14 years 3 months ago
Like an intuitive and courteous butler: a proactive personal agent for task management
The ability to proactively offer assistance promises to make personal agents more helpful to their users. We characterize the properties desired of proactive behaviour by a person...
Neil Yorke-Smith, Shahin Saadati, Karen L. Myers, ...
IAT
2008
IEEE
14 years 2 months ago
Characterizing the Outcomes of Argumentation-Based Integrative Negotiation
In the negotiation literature we find two relatively distinct types of negotiation. The two types are known as integrative negotiations and distributive negotiations. Integrative...
Yannis Dimopoulos, Pavlos Moraitis, Leila Amgoud
SRDS
2007
IEEE
14 years 2 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
CPAIOR
2007
Springer
14 years 2 months ago
On Boolean Functions Encodable as a Single Linear Pseudo-Boolean Constraint
A linear pseudo-Boolean constraint (LPB) is an expression of the form a1 · 1 + . . . + am · m ≥ d, where each i is a literal (it assumes the value 1 or 0 depending on whether a...
Jan-Georg Smaus