Sciweavers

2106 search results - page 99 / 422
» Specifying C concepts
Sort
View
C3S2E
2009
ACM
14 years 2 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
WSC
2004
13 years 11 months ago
XML-Based Supply Chain Simulation Modeling
We describe a different approach to using XML to support the simulation modeling of supply chains. Instead of using XML to specify the simulation constructs, as most previous appr...
Dean C. Chatfield, Terry P. Harrison, Jack C. Hayy...
CCR
2006
92views more  CCR 2006»
13 years 10 months ago
A cooperative uplink power control scheme for elastic data services in wireless CDMA systems
We consider the uplink power control problem in a single cell CDMA wireless data system. Each user specifies upper and lower QoS bounds. We formulate the considered problem as a g...
George Alyfantis, Stathes Hadjiefthymiades, Lazaro...
SYNTHESE
2008
114views more  SYNTHESE 2008»
13 years 10 months ago
Quantified coalition logic
We add a limited but useful form of quantification to Coalition Logic, a popular formalism for reasoning about cooperation in game-like multi-agent systems. The basic constructs o...
Thomas Ågotnes, Wiebe van der Hoek, Michael ...
IAT
2005
IEEE
14 years 3 months ago
Using Similarity Measures for an Efficient Business Information-Exchange
Several problems are involved in the Virtual Enterprise (VE) formation process. One of the most important problems is the lack of understanding that may arise during agents’ int...
Andreia Malucelli, Eugénio C. Oliveira