Sciweavers

2558 search results - page 215 / 512
» Model Composition Contracts
Sort
View
KBSE
2007
IEEE
15 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
POLICY
2007
Springer
15 years 11 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
15 years 8 months ago
The Impact of Experimental Setup on Prepaid Churn Modeling: Data, Population and Outcome Definition
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (‘churn’) at their convenience and without notification. This make...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
155
Voted
KESAMSTA
2010
Springer
15 years 3 months ago
Modeling and Verifying Business Interactions via Commitments and Dialogue Actions
A variety of business interactions in open environments can be captured in terms of creation and manipulation of social commitments among the agents. Such interactions include B2B ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
ICCCI
2009
Springer
15 years 9 months ago
A Multi-agent Model of Deceit and Trust in Intercultural Trade
Trust is a sine qua non for trade. According to transaction cost economics, a contract always offers some opportunity to defect. In the case of asymmetric product information, wher...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...