Sciweavers

371 search results - page 31 / 75
» Adaptation hiding modularity
Sort
View
ICWS
2010
IEEE
14 years 11 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...
ICALP
2007
Springer
14 years 11 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
IEEEIAS
2008
IEEE
15 years 4 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
HICSS
2005
IEEE
93views Biometrics» more  HICSS 2005»
15 years 3 months ago
Service Composition on Top of Exchangable Protocols
Whenever message-oriented middleware is used within applications which run on heterogeneous software systems of multiple partners, and middleware protocols have to be replaced or ...
Stefan Böttcher, Christian Dannewitz
PDCAT
2004
Springer
15 years 3 months ago
Parallel Computing Platform for the Agent-Based Modeling of Multicellular Biological Systems
Abstract. Agent-based simulation of large multicellular biological systems has become a viable option owing to affordable parallel computers, such as Beowulf-style clusters. We de...
Toh Da-Jun, Francis Tang, Travis Lee, Deepak Sarda...