Sciweavers

51 search results - page 5 / 11
» The Use of a Formalised Risk Model in NHS Information System...
Sort
View
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
IEEECIT
2010
IEEE
13 years 6 months ago
Model-Level Debugging of Embedded Real-Time Systems
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
LOCWEB
2009
ACM
14 years 2 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
ATAL
2003
Springer
14 years 23 days ago
Optimizing information exchange in cooperative multi-agent systems
Decentralized control of a cooperative multi-agent system is the problem faced by multiple decision-makers that share a common set of objectives. The decision-makers may be robots...
Claudia V. Goldman, Shlomo Zilberstein
ECBS
2011
IEEE
204views Hardware» more  ECBS 2011»
12 years 7 months ago
Towards Comprehensive Modelling by Inter-model Links Using an Integrating Repository
—Model-based development techniques enable a high efficiency and the mastering of complexity. For many domains more than one model has to be used to express the relevant informat...
Matthias Riebisch, Stephan Bode, Qurat-ul-ann Faro...