Sciweavers

3527 search results - page 337 / 706
» Test Automation in Practice
Sort
View
LPNMR
2009
Springer
15 years 11 months ago
Belief Revision with Bounded Treewidth
Problems arising from the revision of propositional knowledge bases have been intensively studied for two decades. Many different approaches to revision have thus been suggested, w...
Reinhard Pichler, Stefan Rümmele, Stefan Wolt...
ETFA
2008
IEEE
15 years 11 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
107
Voted
NOMS
2008
IEEE
15 years 11 months ago
SPIRIT: Service for providing infrastructure recommendations for IT
We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for Small-to-Medium Businesses (S...
Ashwin Lall, Anca Sailer, Mark Brodie
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
LPNMR
2007
Springer
15 years 11 months ago
The First Answer Set Programming System Competition
This paper gives a summary of the First Answer Set Programming System Competition that was held in conjunction with the Ninth International Conference on Logic Programming and Nonm...
Martin Gebser, Lengning Liu, Gayathri Namasivayam,...