Sciweavers

7778 search results - page 1303 / 1556
» Designing Controllers for Reachability
Sort
View
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ACOM
2004
Springer
15 years 7 months ago
A Model of Rational Agency for Communicating Agents
The Cognitive Agent Specification Language (CASL) is a framework for specifying and verifying complex communicating multiagent systems. In this paper, we develop an extended versi...
Shakil M. Khan, Yves Lespérance
ACSAC
2004
IEEE
15 years 7 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
AINA
2004
IEEE
15 years 7 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
AINTEC
2006
Springer
15 years 7 months ago
Application Performance Assessment on Wireless Ad Hoc Networks
Using ad hoc networks as alternative means of communication in disaster situations is a salutary solution. However, analysing application performance is mandatory for evaluating su...
Razvan Beuran, Ken-ichi Chinen, Khin Thida Latt, T...
« Prev « First page 1303 / 1556 Last » Next »