Sciweavers

7366 search results - page 108 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
MMMACNS
2005
Springer
15 years 9 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
DANCE
2002
IEEE
15 years 9 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
CASCON
1996
109views Education» more  CASCON 1996»
15 years 5 months ago
A system for the seamless integration of personal messages using agents developed on a lotus notes platform
We introduce a seamless messaging system for the management of personal messages. The aim of it is to intercept, filter, interpret, and deliver multi-modal messages (voice, fax, a...
Ramiro Liscano, Roger Impey, Paul Gordon, Suhayya ...
MEDES
2009
ACM
15 years 10 months ago
Protocol for a systematic literature review of research on the Wikipedia
Context: Wikipedia has become one of the ten-most visited sites on the Web, and the world's leading source of Web reference information. Its rapid success has attracted over ...
Chitu Okoli, Kira Schabram
FMOODS
2007
15 years 5 months ago
KeY: A Formal Method for Object-Oriented Systems
Abstract. This paper gives an overview of the KeY approach and highlights the main features of the KeY system. KeY is an approach (and a system) for the deductive verification of ...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...