Sciweavers

1352 search results - page 11 / 271
» Designing Security Requirements Models Through Planning
Sort
View
164
Voted
ICLP
2009
Springer
15 years 10 months ago
Logic Programming for Multiagent Planning with Negotiation
Multiagent planning deals with the problem of generating plans for multiple agents. It requires formalizing ways for the agents to interact and cooperate, in order to achieve their...
Tran Cao Son, Enrico Pontelli, Chiaki Sakama
93
Voted
SAC
2006
ACM
15 years 3 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
92
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 1 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ICRA
2000
IEEE
165views Robotics» more  ICRA 2000»
15 years 1 months ago
An Approach to Rapid Manufacturing with Custom Fixturing
We present an approach for automatically generating complete process plans, including xturing and CNC code, from high level shape feature part descriptions. The demonstration syst...
Mark Bloomenthal, Richard F. Riesenfeld, Elaine Co...
CHI
2003
ACM
15 years 10 months ago
An hour in the life: towards requirements for modelling multiple task work
It is accepted that changes in technology, work practices and the general socio-economic environment affect the way we plan and perform tasks. Support, opportunity and pressure fo...
Peter J. Wild, Peter Johnson, Hilary Johnson