Sciweavers

1154 search results - page 202 / 231
» Semantic Context Reasoning Using Ontology Based Models
Sort
View
RE
2005
Springer
14 years 2 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
14 years 3 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
CSFW
2006
IEEE
14 years 2 months ago
Computationally Sound Compositional Logic for Key Exchange Protocols
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
FM
2009
Springer
157views Formal Methods» more  FM 2009»
14 years 3 months ago
Symbolic Predictive Analysis for Concurrent Programs
Abstract. Predictive analysis aims at detecting concurrency errors during runtime by monitoring a concrete execution trace of a concurrent program. In recent years, various models ...
Chao Wang, Sudipta Kundu, Malay K. Ganai, Aarti Gu...
COMPSAC
2010
IEEE
13 years 6 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...