Sciweavers

290 search results - page 18 / 58
» A Metamodeling Approach for Reasoning about Requirements
Sort
View
CVPR
1996
IEEE
15 years 11 months ago
Comparison of Approaches to Egomotion Computation
We evaluated six algorithms for computing egomotion from image velocities. We established benchmarks for quantifying bias and sensitivity to noise, and for quantifying the converg...
Tina Yu Tian, Carlo Tomasi, David J. Heeger
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
NFM
2011
252views Formal Methods» more  NFM 2011»
14 years 4 months ago
Call Invariants
Program verifiers based on first-order theorem provers model the program heap as a collection of mutable maps. In such verifiers, preserving unmodified facts about the heap acr...
Shuvendu K. Lahiri, Shaz Qadeer
ACMICEC
2006
ACM
89views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
A semantic web approach to handling soft constraints in virtual organisations
In this paper we present a proposal for representing soft constraint satisfaction problems (CSPs) within the Semantic Web architecture. The proposal is motivated by the need for a...
Alun D. Preece, Stuart Chalmers, Craig McKenzie, J...
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...