Sciweavers

400 search results - page 38 / 80
» Reasoning About Hidden Mechanisms
Sort
View
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
15 years 1 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev
ATAL
2005
Springer
15 years 3 months ago
Argument-based negotiation in a social context
Argumentation-based negotiation (ABN) provides agents with an effective means to resolve conflicts within a multi-agent society. However, to engage in such argumentative encounter...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
COOPIS
2002
IEEE
15 years 2 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
IJISEC
2007
149views more  IJISEC 2007»
14 years 9 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
ECOOP
2009
Springer
15 years 10 months ago
Failboxes: Provably Safe Exception Handling
The primary goal of exception mechanisms is to help ensure that when an operation fails, code that depends on the operation's successful completion is not executed (a property...
Bart Jacobs 0002, Frank Piessens