Sciweavers

1737 search results - page 189 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
DRM
2004
Springer
15 years 10 months ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
OOPSLA
2007
Springer
15 years 11 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
FLAIRS
2006
15 years 6 months ago
Efficient Bids on Task Allocation for Multi-Robot Exploration
We propose a real time single item auction based task allocation method for the multi-robot exploration problem and investigate new bid evaluation strategies in this domain. In th...
Sanem Sariel, Tucker R. Balch
JUCS
2010
130views more  JUCS 2010»
14 years 12 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ATAL
2007
Springer
15 years 11 months ago
Sequential Auctions in Uncertain Information Settings
This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncerta...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....