Sciweavers

2979 search results - page 259 / 596
» Modelling secure multiagent systems
Sort
View
CIIA
2009
15 years 6 months ago
Dynamic Scheduling in Petroleum Process using Reinforcement Learning
Petroleum industry production systems are highly automatized. In this industry, all functions (e.g., planning, scheduling and maintenance) are automated and in order to remain comp...
Nassima Aissani, Bouziane Beldjilali
187
Voted
JCM
2006
112views more  JCM 2006»
15 years 5 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
OOPSLA
2007
Springer
15 years 11 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
RTAS
2008
IEEE
15 years 11 months ago
Access Control for Adaptive Reservations on Multi-User Systems
This paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security req...
Tommaso Cucinotta