Sciweavers

1307 search results - page 218 / 262
» Conceptual models: begin by designing what to design
Sort
View
WWW
2010
ACM
15 years 9 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
CCS
2004
ACM
15 years 7 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ATAL
2006
Springer
15 years 5 months ago
Agent interaction in distributed POMDPs and its implications on complexity
The ability to coordinate effectively is critical for agents to accomplish their goals in a multi-agent system. A number of researchers have modeled the coordination problem for m...
Jiaying Shen, Raphen Becker, Victor R. Lesser
WSC
2000
15 years 3 months ago
Using simulation to analyze supply chains
Supply Chain management, the management of the flow of goods or services from materials stage to the end user, is a complex process because of the level of uncertainty at each sta...
Daniel W. Schunk, Beth M. Plott
BIRTHDAY
2010
Springer
15 years 6 months ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem