Sciweavers

10038 search results - page 1840 / 2008
» Model Checking for Managers
Sort
View
CRITIS
2007
15 years 6 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
FOIKS
2008
Springer
15 years 6 months ago
Towards a Fuzzy Logic for Automated Multi-issue Negotiation
Abstract. We present a novel logic-based approach to automate multi-issue bilateral negotiation in e-marketplaces. In such frameworks issues to negotiate on can be multiple, interr...
Azzurra Ragone, Umberto Straccia, Tommaso Di Noia,...
FOIKS
2008
Springer
15 years 6 months ago
Algorithms for Effective Argumentation in Classical Propositional Logic: A Connection Graph Approach
There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting arg...
Vasiliki Efstathiou, Anthony Hunter
INFOSCALE
2007
ACM
15 years 6 months ago
BUST: enabling scalable service orchestration
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...
Dong Liu, Ralph Deters
INFOSCALE
2007
ACM
15 years 6 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
« Prev « First page 1840 / 2008 Last » Next »