Sciweavers

2940 search results - page 469 / 588
» Relational Parametricity and Control
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
GECCO
2008
Springer
172views Optimization» more  GECCO 2008»
14 years 11 months ago
Empirical analysis of a genetic algorithm-based stress test technique
Evolutionary testing denotes the use of evolutionary algorithms, e.g., Genetic Algorithms (GAs), to support various test automation tasks. Since evolutionary algorithms are heuris...
Vahid Garousi
GECCO
2008
Springer
160views Optimization» more  GECCO 2008»
14 years 11 months ago
Self-managing agents for dynamic scheduling in manufacturing
The main purpose of this paper is to propose a Multi-Agent Autonomic and Bio-Inspired based framework with selfmanaging capabilities to solve complex scheduling problems using coo...
Ana Madureira, Filipe Santos, Ivo Pereira
HASKELL
2008
ACM
14 years 11 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
CHI
2010
ACM
14 years 10 months ago
Multitasking bar: prototype and evaluation of introducing the task concept into a browser
This paper clarifies two common patterns of multitasking on the Web, namely Multiple Tasks (MT) and Multiple Session Task (MST). To support both of these, the task concept needs t...
Qing Wang, Huiyou Chang