Sciweavers

855 search results - page 163 / 171
» Using First-Order Logic to Reason about Policies
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 20 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
AIPS
2009
13 years 10 months ago
Flexible Execution of Plans with Choice
Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties while improving robustness and reducing the need for an overly conservative plan. Executive...
Patrick R. Conrad, Julie A. Shah, Brian C. William...
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 8 months ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann
WS
2005
ACM
14 years 2 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
ER
1997
Springer
145views Database» more  ER 1997»
14 years 28 days ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli