Sciweavers

984 search results - page 172 / 197
» The Use of Software Agents as Proxies
Sort
View
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CCS
2010
ACM
13 years 8 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
ATAL
2009
Springer
14 years 3 months ago
Aerogility: an intelligent decision support system for managing service-based aftermarkets
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...
SKG
2005
IEEE
14 years 2 months ago
Converting the Industry Foundation Classes to the Web Ontology Language
The upcoming next generation of the internet, often referred to as the Semantic Web, will bring a lot of new technologies, one of which is the Web Ontology Language (OWL). One fea...
Hans Schevers, Robin Drogemuller
ICRE
1996
IEEE
14 years 19 days ago
A facilitator method for upstream design activities with diverse stakeholders
This paper presents a method that can be used for the elicitation and speci cation of requirements and high-level design. It supports stakeholder-based modeling, rapid feasibility...
Regina M. Gonzales, Alexander L. Wolf