Sciweavers

10038 search results - page 206 / 2008
» Model Checking for Managers
Sort
View
DRM
2004
Springer
15 years 9 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
KR
2004
Springer
15 years 9 months ago
A Logic of Motion
There are numerous applications such as air traffic management, cellular phone location tracking, and vehicle protection systems where there is a critical need to reason about mo...
Fusun Yaman, Dana S. Nau, V. S. Subrahmanian
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 9 months ago
Assessments of Usability Engineering Processes: Experiences from Experiments
We carried out eight assessments of usability engineering processes in four industrial companies, for the purpose of providing a basis for process improvement. The research method...
Timo Jokela
SEKE
1995
Springer
15 years 8 months ago
Visual Scenarios for Validation of Requirements Specification
The development of a large information system is generally regarded as one of the most complex activities undertaken by organizations and it is dependent on the communication and u...
V. Lalioti, Babis Theodoulidis
CSCWD
2005
Springer
15 years 6 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst