Sciweavers

37 search results - page 3 / 8
» Name Strategy: Its Existence and Implications
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz
ENTCS
2002
115views more  ENTCS 2002»
13 years 6 months ago
Component-Based Applications: A Dynamic Reconfiguration Approach with Fault Tolerance Support
This paper presents a mechanism for dynamic reconfiguration of component-based applications and its fault tolerance strategy. The mechanism, named generic connector, allows compos...
Thaís Vasconcelos Batista, Milano Gadelha C...
CN
1999
87views more  CN 1999»
13 years 6 months ago
The Gecko NFS Web Proxy
The World-Wide Web provides remote access to pages using its own naming scheme (URLs), transfer protocol (HTTP), and cache algorithms. Not only does using these special-purpose me...
Scott M. Baker, John H. Hartman
MFCS
2010
Springer
13 years 4 months ago
Qualitative Analysis of Partially-Observable Markov Decision Processes
We study observation-based strategies for partially-observable Markov decision processes (POMDPs) with parity objectives. An observationbased strategy relies on partial information...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
SYNTHESE
2010
130views more  SYNTHESE 2010»
13 years 4 months ago
Belief ascription under bounded resources
There exists a considerable body of work on epistemic logics for resource-bounded reasoners. In this paper, we concentrate on a less studied aspect of resource-bounded reasoning, n...
Natasha Alechina, Brian Logan