Sciweavers

1415 search results - page 217 / 283
» Verified systems by composition from verified components
Sort
View
GRID
2007
Springer
13 years 7 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
TWC
2008
110views more  TWC 2008»
13 years 7 months ago
Information outage probability and diversity order of symmetric coordinate interleaved orthogonal designs
Space-time block codes (STBCs) from coordinate interleaved orthogonal designs (CIODs) have attracted considerable attention lately due to their full-diversity and single-symbol dec...
Hoojin Lee, Jeffrey G. Andrews, Edward J. Powers
CI
2000
134views more  CI 2000»
13 years 7 months ago
Choosing Rhetorical Structures to Plan Instructional Texts
This paper discusses a fundamental problem in natural language generation: how to organize the content of a text in a coherent and natural way. In this research, we set out to det...
Leila Kosseim, Guy Lapalme
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SEDE
2010
13 years 5 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble