Sciweavers

2200 search results - page 330 / 440
» The Generalized Pignistic Transformation
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
Design multicast protocols for non-cooperative networks
— Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most n...
Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang 00...
KBSE
2005
IEEE
15 years 10 months ago
Generation of visual editors as eclipse plug-ins
Visual Languages (VLs) play an important role in software system development. Especially when looking at well-defined domains, a broad variety of domain specific visual language...
Karsten Ehrig, Claudia Ermel, Stefan Hänsgen,...
WCRE
2005
IEEE
15 years 10 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
132
Voted
WORDS
2005
IEEE
15 years 10 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
HT
2005
ACM
15 years 10 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis