Sciweavers

2196 search results - page 29 / 440
» Practical Reasoning Using Values
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
81
Voted
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
15 years 5 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
IJCAI
2003
15 years 1 months ago
Tractable Symmetry Breaking for CSPs with Interchangeable Values
Symmetry breaking in CSPs has attracted consid­ erable attention in recent years. Various general schemes have been proposed to eliminate sym­ metries during search. In general,...
Pascal Van Hentenryck, Pierre Flener, Justin Pears...
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
14 years 10 months ago
Satisfaction Meets Expectations - Computing Expected Values of Probabilistic Hybrid Systems with SMT
Stochastic satisfiability modulo theories (SSMT), which is an extension of satisfiability modulo theories with randomized quantification, has successfully been used as a symboli...
Martin Fränzle, Tino Teige, Andreas Eggers
CP
2009
Springer
16 years 12 days ago
The Complexity of Valued Constraint Models
The Valued Constraint Satisfaction Problem (VCSP) is a general framework encompassing many optimisation problems. We discuss precisely what it means for a problem to be modelled in...
Peter G. Jeavons, Stanislav Zivný