Sciweavers

4890 search results - page 951 / 978
» From system specifications to component behavioral models
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ECRA
2002
113views more  ECRA 2002»
14 years 11 months ago
A European perspective towards online one-stop government: the eGOV project
E-Government reflects current visions for public administrations towards modernization and reorganization. Thereof, online one-stop Government targets the improvement of customer-...
Maria Wimmer
CIKM
2006
Springer
15 years 3 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
MBEES
2008
15 years 1 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...
ATAL
2010
Springer
15 years 28 days ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...