Sciweavers

2200 search results - page 330 / 440
» The Generalized Pignistic Transformation
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Design multicast protocols for non-cooperative networks
— Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most n...
Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang 00...
KBSE
2005
IEEE
14 years 2 months ago
Generation of visual editors as eclipse plug-ins
Visual Languages (VLs) play an important role in software system development. Especially when looking at well-defined domains, a broad variety of domain specific visual language...
Karsten Ehrig, Claudia Ermel, Stefan Hänsgen,...
WCRE
2005
IEEE
14 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WORDS
2005
IEEE
14 years 2 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
HT
2005
ACM
14 years 2 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis