Sciweavers

4511 search results - page 532 / 903
» Observation Based System Security
Sort
View
IACR
2011
137views more  IACR 2011»
14 years 4 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
ICAC
2006
IEEE
15 years 11 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
OOPSLA
2007
Springer
15 years 11 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
LPNMR
2007
Springer
15 years 11 months ago
Using Answer Sets to Solve Belief Change Problems
We describe BE, an implemented system for solving belief change problems in the presence of actions. We illustrate how we can use BE to compute the result of belief progression, be...
Aaron Hunter, James P. Delgrande, Joel Faber
ESAW
2004
Springer
15 years 10 months ago
Controlled Experimentation with Agents - Models and Implementations
The deployment of multi-agent systems demands for justified confidence into their behaviour, both with respect to correct results of computations and with respect to timeliness t...
Mathias Röhl, Adelinde Uhrmacher