Sciweavers

129 search results - page 10 / 26
» Guidelines for designing IT security management tools
Sort
View
JCP
2008
116views more  JCP 2008»
14 years 9 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ER
2007
Springer
125views Database» more  ER 2007»
15 years 3 months ago
On the Correlation between Process Model Metrics and Errors
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive ap...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...
SEMWEB
2007
Springer
15 years 3 months ago
Lifecycle-Support in Architectures for Ontology-Based Information Systems
Ontology-based applications play an increasingly important role in the public and corporate Semantic Web. While today there exist a range of tools and technologies to support speci...
Thanh Tran, Peter Haase, Holger Lewen, Ósca...
RAS
2010
137views more  RAS 2010»
14 years 8 months ago
Development of complex robotic systems using the behavior-based control architecture iB2C
This paper presents a development methodology for complex robotic systems using the behavior-based control architecture iB2C (integrated Behavior-Based Control). It is shown how a...
Martin Proetzsch, Tobias Luksch, Karsten Berns
CSFW
1992
IEEE
15 years 1 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko