Sciweavers

928 search results - page 125 / 186
» Interpolation-sequence based model checking
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 8 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
COGSR
2011
82views more  COGSR 2011»
14 years 5 months ago
Executive control of retrieval in noun and verb generation
In verb/noun generation experiments, participants have to produce a word associated with a stimulus (usually a noun) and belonging to a given syntactic category (“verb” or “...
Fabio Del Missier, Cristiano Crescentini
GEOINFORMATICA
2011
14 years 5 months ago
Functional description of geoprocessing services as conjunctive datalog queries
Discovery of suitable web services is a crucial task in Spatial Data Infrastructures (SDI). In this work, we develop a novel approach to the discovery of geoprocessing services (WP...
Daniel Fitzner, Jörg Hoffmann, Eva Klien
DALT
2010
Springer
14 years 5 months ago
Executing Specifications of Social Reasoning Agents
Social reasoning theories, whilst studied extensively in the area of multiagent systems, are hard to implement directly in agents. They often specify properties of beliefs or behav...
Iain Wallace, Michael Rovatsos
ESORICS
2011
Springer
13 years 9 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...