Sciweavers

4286 search results - page 667 / 858
» Formalizing Service Interactions
Sort
View
ENTCS
2007
131views more  ENTCS 2007»
15 years 4 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
RTS
2006
176views more  RTS 2006»
15 years 3 months ago
Verifying distributed real-time properties of embedded systems via graph transformations and model checking
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
Gabor Madl, Sherif Abdelwahed, Douglas C. Schmidt
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
AI
2004
Springer
15 years 3 months ago
Logic-based subsumption architecture
We describe a logic-based AI architecture based on Brooks' subsumption architecture. In this architecture, we axiomatize different layers of control in First-Order Logic (FOL...
Eyal Amir, Pedrito Maynard-Zhang
COMCOM
2004
84views more  COMCOM 2004»
15 years 3 months ago
A dynamic pricing scheme for e-content at multiple levels-of-service
Businesses selling multimedia rich software or e-content are growing in the Internet. The e-content can be downloaded or streamed immediately after an on-line transaction. Since I...
Srinivasan Jagannathan, Kevin C. Almeroth