Sciweavers

3212 search results - page 168 / 643
» Faster Concept Analysis
Sort
View
IH
2005
Springer
15 years 10 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
150
Voted
MATES
2005
Springer
15 years 10 months ago
LEADSTO: A Language and Environment for Analysis of Dynamics by SimulaTiOn
This paper presents the language and software environment LEADSTO that has been developed to model and simulate the dynamics of Multi-Agent Systems (MAS) in terms of both qualitati...
Tibor Bosse, Catholijn M. Jonker, Lourens van der ...
CAISE
2004
Springer
15 years 10 months ago
Impact Analysis for Supporting the Co-Evolution of Business Processes and Supporting Software Systems
The co-evolution of business processes and supporting software systems is needed for keeping them aligned and it requires managerial and technological effort for adequately plannin...
Thierry Bodhuin, Raffaele Esposito, Cristina Pacel...
122
Voted
CCS
2003
ACM
15 years 9 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
NOMS
2000
IEEE
144views Communications» more  NOMS 2000»
15 years 9 months ago
Managing application services over service provider networks: architecture and dependency analysis
This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors’ experience with the IBM Global Network. It describes how one can e...
Gautam Kar, Alexander Keller, Seraphin B. Calo