Sciweavers

252 search results - page 23 / 51
» Why Do Upgrades Fail and What Can We Do about It
Sort
View
ACSC
2008
IEEE
14 years 2 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
SYNTHESE
2010
70views more  SYNTHESE 2010»
13 years 2 months ago
Models and fiction
Most scientific models are not physical objects, and this raises important questions. What sort of entity are models, what is truth in a model, and how do we learn about models? In...
Roman Frigg
TSE
1998
93views more  TSE 1998»
13 years 7 months ago
A Strategy for Improving Safety Related Software Engineering Standards
—There are many standards which are relevant for building safety or mission critical software systems. An effective standard is one that should help developers, assessors, and us...
Norman E. Fenton, Martin Neil
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 28 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...