Sciweavers

733 search results - page 100 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
FAC
2007
128views more  FAC 2007»
14 years 11 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
HCI
2009
14 years 9 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
IFIP
1992
Springer
15 years 3 months ago
Intelligent Access to Data and Knowledge Bases via User's Topics of Interest
Retrieving relevant information in Data and Knowledge Bases containing a large number of di erent types of information is a non trivial problem. That is the reason why, in areas l...
Sylvie Cazalens, Robert Demolombe
SDB
1995
95views Database» more  SDB 1995»
15 years 3 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
ATAL
2008
Springer
15 years 1 months ago
Checking correctness of business contracts via commitments
Business contracts tend to be complex. In current practice, contracts are often designed by hand and adopted by their participants after, at best, a manual analysis. This paper mo...
Nirmit Desai, Nanjangud C. Narendra, Munindar P. S...