Sciweavers

580 search results - page 82 / 116
» Some Computational Aspects of distance-sat
Sort
View
TACS
1991
Springer
15 years 3 months ago
An Extension of System F with Subtyping
System F is a well-known typed λ-calculus with polymorphic types, which provides a basis for polymorphic programming languages. We study an extension of F, called F<: (pronoun...
Luca Cardelli, Simone Martini, John C. Mitchell, A...
USENIX
2007
15 years 2 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
ISSA
2008
15 years 1 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
ECIS
2004
15 years 1 months ago
The problem of integrating ethics into IS practice
In this paper we discuss a number of implications which follow from the way that the information systems discipline has developed, largely separately, from computer ethics. These ...
Frances Bell, Alison Adam
EUMAS
2006
15 years 1 months ago
DimaX: A Fault-Tolerant Multi-Agent Platform
Fault tolerance is an important property of large-scale multiagent systems as the failure rate grows with both the number of the hosts and deployed agents, and the duration of com...
Nora Faci, Zahia Guessoum, Olivier Marin