Sciweavers

5326 search results - page 42 / 1066
» On what we can ensure
Sort
View
108
Voted
ECSA
2010
Springer
15 years 23 days ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
KR
1989
Springer
15 years 4 months ago
What the Lottery Paradox Tells Us About Default Reasoning
In this paper I argue that we do not understand the process of default reasoning. A number of examples are given which serve to distinguish di erent default reasoning systems. It ...
David Poole
106
Voted
COMPLEXITY
2007
104views more  COMPLEXITY 2007»
15 years 17 days ago
What is the complexity of a distributed computing system?
Distributed computing systems are becoming bigger and more complex. While the complexity of large-scale distributed systems has been acknowledged to be an important challenge, the...
Anand Ranganathan, Roy H. Campbell
103
Voted
IPPS
2008
IEEE
15 years 7 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
DAWAK
2006
Springer
15 years 4 months ago
What Time Is It in the Data Warehouse?
Though in most data warehousing applications no relevance is given to the time when events are recorded, some domains call for a different behavior. In particular, whenever late re...
Stefano Rizzi, Matteo Golfarelli