Sciweavers

2978 search results - page 414 / 596
» Operations Research
Sort
View
120
Voted
MOBIDE
2009
ACM
15 years 8 months ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...
SAC
2009
ACM
15 years 8 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
134
Voted
ICLP
2009
Springer
15 years 8 months ago
Integration of Abductive Reasoning and Constraint Optimization in SCIFF
Abstract. Abductive Logic Programming (ALP) and Constraint Logic Programming (CLP) share the feature to constrain the set of possible solutions to a program via integrity or CLP co...
Marco Gavanelli, Marco Alberti, Evelina Lamma
124
Voted
IFIP
2001
Springer
15 years 8 months ago
Semiotics and Intelligent Control
The overall purpose of this paper is to demonstrate the relevance of semiotics concepts to the analysis of intelligent control systems. Semiotics has only a minor impact on resear...
Morten Lind
RE
2001
Springer
15 years 8 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...