Sciweavers

5255 search results - page 926 / 1051
» Formal Methods for Privacy
Sort
View
SAC
2004
ACM
15 years 9 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
AFP
2004
Springer
128views Formal Methods» more  AFP 2004»
15 years 9 months ago
GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications
Abstract. Programming GUIs with conventional GUI APIs is notoriously tedious. In these notes we present the GEC toolkit in which the programmer can create user interfaces without a...
Peter Achten, Marko C. J. D. van Eekelen, Rinus Pl...
AUSAI
2004
Springer
15 years 9 months ago
BayesTH-MCRDR Algorithm for Automatic Classification of Web Document
Nowadays, automated Web document classification is considered as an important method to manage and process an enormous amount of Web documents in digital forms that are extensive a...
Woo-Chul Cho, Debbie Richards
CAISE
2004
Springer
15 years 9 months ago
Goal-Driven Analysis of Process Model Validity
Business process modeling and design, which has attracted much attention in recent years, emphasizes mainly graphical representation, usually without an underlying theory. The lack...
Pnina Soffer, Yair Wand
CAV
2004
Springer
123views Hardware» more  CAV 2004»
15 years 9 months ago
SAL 2
SAL 2 augments the specification language and explicit-state model checker of SAL 1 with high-performance symbolic and bounded model checkers, and with novel infinite bounded and...
Leonardo Mendonça de Moura, Sam Owre, Haral...