Sciweavers

5722 search results - page 946 / 1145
» Security Function Interactions
Sort
View
218
Voted
EVOTING
2004
100views Hardware» more  EVOTING 2004»
15 years 5 months ago
E-Democracy in E-Austria
Abstract: Christian Rupp has been appointed Federal Executive Secretary of EGovernment in May of 2003. At that point of time a new E-Government Platform was introduced. He reports ...
Christian Rupp
137
Voted
CSL
2010
Springer
15 years 4 months ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel
125
Voted
CONEXT
2009
ACM
15 years 4 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
DGO
2008
112views Education» more  DGO 2008»
15 years 4 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
158
Voted
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 4 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...