Sciweavers

474 search results - page 52 / 95
» Computing integral solutions of complementarity problems
Sort
View
IDTRUST
2010
ACM
15 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
EDOC
2007
IEEE
15 years 4 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
ICAIL
2003
ACM
15 years 3 months ago
Induction of Defeasible Logic Theories in the Legal Domain
Defeasible Logic is a promising representation for legal knowledge that appears to overcome many of the deficiencies of previous approaches to representing legal knowledge. Unfor...
Benjamin Johnston, Guido Governatori
BTW
2009
Springer
150views Database» more  BTW 2009»
15 years 1 months ago
The Frontiers of Data Programmability
: Simplifying data programming is a core mission of data management research. The issue at stake is to help engineers build efficient and robust data-centric applications. The fron...
Sergey Melnik
ISORC
2006
IEEE
15 years 3 months ago
Complexity Management for Composable Real-Time Systems
Embedded real-time systems are becoming increasingly complex due to ever increasing size and functionality so that complexity management is of growing importance, especially in de...
Bernhard Rumpler