Sciweavers

1527 search results - page 98 / 306
» What About Wednesday
Sort
View
DEON
2008
Springer
13 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
DGO
2007
125views Education» more  DGO 2007»
13 years 10 months ago
Members of congress websites: diffusion at the tip of the iceberg
How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...
IJCAI
1997
13 years 10 months ago
Development of Iterative Real-time Scheduler to Planner Feedback
Planning for real-time applications involves decisions not only about what actions to take in what states to progress toward achieving goals (the traditional decision problem face...
Charles B. McVey, Ella M. Atkins, Edmund H. Durfee...
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 10 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner

Book
1709views
15 years 6 months ago
The Theory and Technique of Electronic Music
"This is a book about using electronic techniques to record, synthesize, process, and analyze musical sounds, a practice which came into its modern form in the years 1948-19...
Miller Puckette