Sciweavers

5414 search results - page 876 / 1083
» Exploratory Model Building
Sort
View
141
Voted
AOSE
2007
Springer
15 years 9 months ago
O-MaSE: A Customizable Approach to Developing Multiagent Development Processes
This paper describes the Organization-based Multiagent System Engineering (O-MaSE) Process Framework, which helps process engineers define custom multiagent systems development pr...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...
117
Voted
CAV
2007
Springer
173views Hardware» more  CAV 2007»
15 years 9 months ago
Array Abstractions from Proofs
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
Ranjit Jhala, Kenneth L. McMillan
142
Voted
CCS
2007
ACM
15 years 9 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
108
Voted
CICLING
2007
Springer
15 years 9 months ago
Adapting the JIRS Passage Retrieval System to the Arabic Language
The need of having a Passage Retrieval (PR) system for Arabic texts is due essentially to our aim to build an Arabic Question Answering (QA) system in our research team. We have ch...
Yassine Benajiba, Paolo Rosso, José Manuel ...
130
Voted
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz