Sciweavers

282 search results - page 48 / 57
» An Algebraic Method for Analyzing Open-Loop Dynamic Systems
Sort
View
EMSOFT
2004
Springer
15 years 3 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
JNS
2010
61views more  JNS 2010»
14 years 8 months ago
Validity and Failure of the Boltzmann Approximation of Kinetic Annihilation
This paper introduces a new method to show the validity of a continuum description for the deterministic dynamics of many interacting particles. Here the many particle evolution is...
Karsten Matthies, Florian Theil
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 4 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker
APSEC
1998
IEEE
15 years 2 months ago
Change Impact Analysis for A Class Hierarchy
Modified programs are required to be retested to determine whether changes have been made correctly and to investigate whether those cause any adverse effect on the program behavi...
Yoon Kyu Jang, Heung Seok Chae, Yong Rae Kwon, Doo...
PKDD
2010
Springer
150views Data Mining» more  PKDD 2010»
14 years 8 months ago
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...