Sciweavers

551 search results - page 29 / 111
» Preventing existence
Sort
View
83
Voted
DSN
2004
IEEE
15 years 1 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
ATAL
2008
Springer
14 years 11 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
69
Voted
BNCOD
2008
88views Database» more  BNCOD 2008»
14 years 11 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
IFIP8
2007
14 years 11 months ago
A Hybrid Approach for Business Process Verification
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
Bing Li, Junichi Iijima
ISTA
2007
14 years 11 months ago
Return on Security Investments - Design Principles of Measurement Systems Based on Capital Budgeting
: IT-security has become a vital factor in electronic commerce nowadays. Thus, investments have to be made in order to safeguard security. However, the benefits of these investment...
Jan vom Brocke, Gereon Strauch, Christian Buddendi...