Sciweavers

1325 search results - page 181 / 265
» An Approach to Generation of Decision Rules
Sort
View
SAFECOMP
2007
Springer
15 years 4 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
HM
2005
Springer
140views Optimization» more  HM 2005»
15 years 3 months ago
Fast Ejection Chain Algorithms for Vehicle Routing with Time Windows
Abstract. This paper introduces a new algorithm, based on the concept of ejection chains, to effectively target vehicle routing problems with time window constraints (VRPTW). Ejec...
Herman Sontrop, Pieter van der Horn, Marc Uetz
FM
2003
Springer
108views Formal Methods» more  FM 2003»
15 years 3 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002
SEMWEB
2001
Springer
15 years 2 months ago
A Scalable Framework for the Interoperation of Information Sources
Resolving heterogeneity among information systems is a crucial necessity if we wish to gain value from the many distributed resources available to us. Problems of heterogeneity in ...
Prasenjit Mitra, Gio Wiederhold, Stefan Decker
WISE
2000
Springer
15 years 2 months ago
Object-Oriented Mediator Queries to XML Data
The mediator/wrapper approach is used to integrate data from different databases and other data sources by introducing a middleware virtual database that provides high level abstr...
Hui Lin, Tore Risch, Timour Katchaounov