Sciweavers

293 search results - page 56 / 59
» Value-at-Risk in IT Services Contracts
Sort
View
NDSS
2000
IEEE
14 years 2 days ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
DLOG
2006
13 years 9 months ago
Towards Mobile Reasoning
Highly optimized reasoning support for Description Logics (DLs) has been developed during the past years. This paper presents our efforts to develop a reasoner suitable for mobile ...
Thomas Kleemann
AAAI
1998
13 years 9 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
USENIX
1990
13 years 8 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
CCS
2010
ACM
13 years 8 months ago
Dissecting one click frauds
"One Click Fraud" is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of polic...
Nicolas Christin, Sally S. Yanagihara, Keisuke Kam...