Sciweavers

1235 search results - page 196 / 247
» Formalizing information security knowledge
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
14 years 10 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
WWW
2008
ACM
16 years 15 days ago
Circular context-based semantic matching to identify web service composition
This paper provides initial analysis in identifying possible Web services composition using context-based semantic matching. Context-based semantic matching allows service composi...
Aviv Segev
MOBIHOC
2009
ACM
16 years 11 days ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
HICSS
2008
IEEE
185views Biometrics» more  HICSS 2008»
15 years 6 months ago
Organizational Readiness for Business Process Outsourcing: A Model of Determinants and Impact on Outsourcing Success
In innovation adoption literature, the important role of the organizational context as a determinant of information systems (IS) success has long been pointed out. Various factors...
Sebastian F. Martin, Daniel Beimborn, Mihir A. Par...
GEOS
2007
Springer
15 years 6 months ago
A Location and Action-Based Model for Route Descriptions
Abstract. Representing human spatial knowledge has long been a challenging research area. The objective of this paper is to model a route description of human navigation where verb...
David Brosset, Christophe Claramunt, Eric Saux