Sciweavers

205 search results - page 14 / 41
» Using Work Agreements as Operation-time System Requirements ...
Sort
View
EUROSYS
2007
ACM
14 years 4 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
AOSE
2007
Springer
13 years 11 months ago
Refining Goal Models by Evaluating System Behaviour
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 2 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
IWSOS
2007
Springer
14 years 1 months ago
Dynamic Ontology Mapping for Interacting Autonomous Systems
Abstract. With the emergence of mobile and ubiquitous computing environments, there is a requirement to enable collaborative applications between these environments. As many of the...
Steven Heeps, Joe Sventek, Naranker Dulay, Alberto...
RIAO
2000
13 years 9 months ago
Speaker change detection using joint audio-visual statistics
In this paper, we present an approach for speaker change detection in broadcast video using joint audio-visual scene change statistics. Our experiments indicate that using joint a...
Giridharan Iyengar, Chalapathy Neti, Sankar Basu