Sciweavers

973 search results - page 123 / 195
» Arguing Using Opponent Models
Sort
View
MONTEREY
2007
Springer
15 years 11 months ago
Logic-Based Regulatory Conformance Checking
In this paper, we describe an approach to formally assess whether an organization conforms to a body of regulation. Conformance is cast as a model checking question where the regul...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 10 months ago
Offshore Outsourcing: Counteracting Forces and Their Dynamic Effects
Many argue that offshoring is an inexorable trend since IT skills have become a global commodity and they are vastly cheaper in other parts of the world. According to this view, m...
Amitava Dutta, Rahul Roy
TSD
2005
Springer
15 years 10 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...
B
2007
Springer
15 years 9 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
131
Voted
EDCC
2008
Springer
15 years 6 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger