Sciweavers

293 search results - page 56 / 59
» Value-at-Risk in IT Services Contracts
Sort
View
NDSS
2000
IEEE
15 years 2 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
93
Voted
DLOG
2006
14 years 11 months ago
Towards Mobile Reasoning
Highly optimized reasoning support for Description Logics (DLs) has been developed during the past years. This paper presents our efforts to develop a reasoner suitable for mobile ...
Thomas Kleemann
AAAI
1998
14 years 11 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
USENIX
1990
14 years 11 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
71
Voted
CCS
2010
ACM
14 years 10 months ago
Dissecting one click frauds
"One Click Fraud" is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of polic...
Nicolas Christin, Sally S. Yanagihara, Keisuke Kam...