Sciweavers

1995 search results - page 273 / 399
» What's the Problem
Sort
View
CCS
2004
ACM
15 years 9 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ESORICS
2004
Springer
15 years 9 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
EWCBR
2004
Springer
15 years 9 months ago
Explanations and Case-Based Reasoning: Foundational Issues
By design, Case-Based Reasoning (CBR) systems do not need deep general knowledge. In contrast to (rule-based) expert systems, CBR systems can already be used with just some initial...
Thomas Roth-Berghofer
HUC
2004
Springer
15 years 9 months ago
The Carrot Approach: Encouraging Use of Location Systems
The Active Bat system provides the ability to locate users and equipment with a high degree of accuracy and coverage. Despite this, participation is low. We are concerned that this...
Kieran Mansley, Alastair R. Beresford, David Scott
IEAAIE
2004
Springer
15 years 9 months ago
Change Summarization in Web Collections
World Wide Web is not only enormous but also dynamic information space. Every day large quantity of new information is published on web pages. Many times people want to know what a...
Adam Jatowt, Khoo Khyou Bun, Mitsuru Ishizuka