Sciweavers

489 search results - page 40 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
MMMACNS
2005
Springer
15 years 6 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
AAAI
2012
13 years 2 months ago
Learning from Demonstration for Goal-Driven Autonomy
Goal-driven autonomy (GDA) is a conceptual model for creating an autonomous agent that monitors a set of expectations during plan execution, detects when discrepancies occur, buil...
Ben George Weber, Michael Mateas, Arnav Jhala
POPL
2003
ACM
16 years 24 days ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani
80
Voted
CHI
2009
ACM
15 years 5 months ago
A design evaluation of a user interface for tending long-term tasks
Organizational processes often take place over long periods of time and require intermittent attention. Remembering and reasoning about upcoming process tasks is important, but no...
Robert Farrell, Hina Shah, Thomas Erickson, Wendy ...
102
Voted
DEON
2006
Springer
15 years 4 months ago
A Question of Trust: Assessing the Fulfillment of Commitments in Terms of Strategies
We aim at an adequate formal description of the dynamics of commitments and trust by transferring insights about actual human practices to a formal setting. Our framework is based ...
Thomas Müller