Sciweavers

4166 search results - page 151 / 834
» Automating the constraining process
Sort
View
IFIP
2009
Springer
14 years 8 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
IFIP12
2009
14 years 8 months ago
Automated Product Pricing Using Argumentation
This paper describes an argumentation-based approach for automating the decision making process of an autonomous agent for pricing products. Product pricing usually involves differ...
Nikolaos I. Spanoudakis, Pavlos Moraitis
CHI
2002
ACM
15 years 10 months ago
Automated message prioritization: making voicemail retrieval more efficient
Navigating through new voicemail messages to find messages of interest is a time-consuming task, particularly for high-volume users. When checking messages under a time constraint...
Meridith Ringel, Julia Hirschberg
ICCAD
2006
IEEE
208views Hardware» more  ICCAD 2006»
15 years 7 months ago
Automation in mixed-signal design: challenges and solutions in the wake of the nano era
The use of CMOS nanometer technologies at 65 nm and below will pose serious challenges on the design of mixed-signal integrated systems in the very near future. Rising design comp...
Trent McConaghy, Georges G. E. Gielen
90
Voted
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 5 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay