Sciweavers

4048 search results - page 573 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
145
Voted
EGC
2005
Springer
15 years 9 months ago
Workflow-Oriented Collaborative Grid Portals
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals ...
Gergely Sipos, Gareth J. Lewis, Péter Kacsu...
126
Voted
TGC
2005
Springer
15 years 9 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
118
Voted
GECCO
2004
Springer
104views Optimization» more  GECCO 2004»
15 years 9 months ago
Optimal Operating Conditions for Overhead Crane Maneuvering Using Multi-objective Evolutionary Algorithms
While operating a crane for maximum productivity, the time of operation and the required energy are two important conflicting factors faced by a crane operator. In such a case, tr...
Kalyanmoy Deb, Naveen Kumar Gupta
COMMA
2008
15 years 5 months ago
Arguments from Experience: The PADUA Protocol
In this paper we describe PADUA, a protocol designed to enable agents to debate an issue drawing arguments not from a knowledge base of facts, rules and priorities but directly fro...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...