Sciweavers

3516 search results - page 270 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
126
Voted
AMAI
2006
Springer
15 years 4 months ago
Answer set based design of knowledge systems
The aim of this paper is to demonstrate that A-Prolog is a powerful language for the construction of reasoning systems. In fact, A-Prolog allows to specify the initial situation, t...
Marcello Balduccini, Michael Gelfond, Monica Nogue...
ACMSE
2004
ACM
15 years 9 months ago
Interface design for a modern software ticketing system
This paper describes issues in the design of IT-centric trouble-ticketing applications. Two prototypes are presented. The first introduces a user-centric, webaccessible thick clie...
Minhui Xie, Mark Tomlinson, Bobby Bodenheimer
ETFA
2005
IEEE
15 years 9 months ago
Fuzzy multi-objective optimization for network design of logistic and production systems
Global competition has given rise to Logistic and Production Systems (LPSs), that are distributed manufacturing systems integrating international logistics and information technol...
Mariagrazia Dotoli, Maria Pia Fanti, Agostino Marc...
MSWIM
2006
ACM
15 years 10 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...
144
Voted
ESORICS
2009
Springer
16 years 4 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...