Sciweavers

2209 search results - page 239 / 442
» Language Based Secure Communication
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 7 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
IADIS
2003
15 years 5 months ago
Moda-Ml, an Interoperability Framework for the Textile-Clothing Sector
The MODA-ML project aims to enhance the interoperability between enterprises in the Textile/Clothing sector defining a common interchange language based on a set of XML business c...
Nicola Gessa, Fabio Vitali, Guido Cucchiara, Piero...
OOPSLA
2009
Springer
15 years 10 months ago
The design of a task parallel library
The Task Parallel Library (TPL) is a library for .NET that makes it easy to take advantage of potential parallelism in a program. The library relies heavily on generics and delega...
Daan Leijen, Wolfram Schulte, Sebastian Burckhardt
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
SDMW
2004
Springer
15 years 9 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...