Sciweavers

14824 search results - page 2596 / 2965
» Security - Introduction
Sort
View
139
Voted
RULEML
2005
Springer
15 years 9 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh
102
Voted
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 9 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
143
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha
101
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Safety Interfaces for Component-Based Systems
Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea
115
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment
Event trees are a popular technique for modelling accidents in system safety analyses. Bayesian networks are a probabilistic modelling technique representing influences between unc...
George Bearfield, William Marsh
« Prev « First page 2596 / 2965 Last » Next »