Results 1 - 10
of
527
Understanding Code Mobility
- IEEE COMPUTER SCIENCE PRESS
, 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract
-
Cited by 560 (34 self)
- Add to MetaCart
implementation technologies. The presentation of the classification is intertwined with a review of the state of the art in the field. Finally, the use of the classification is exemplified in a case study.
Secure and selective dissemination of xml documents
- ACM Transactions on Information and System Security
, 2002
"... XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus t ..."
Abstract
-
Cited by 121 (14 self)
- Add to MetaCart
XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
reward mechanisms. The framework is based on the description of observable behavior and superficially resembles the behaviorist approach, although mental states 92 SCHULTZ of representation and prediction are essential. Dropping the issues of subjective feelings of pleasure will allow us to do objective
A Logic Programming Approach to Knowledge-State Planning, II: The DLV System
, 2001
"... In Part I of this series of papers, we have proposed a new logic-based planning language, called K. This language facilitates the description of transitions between states of knowledge and it is well suited for planning under incomplete knowledge. Nonetheless, K also supports the representation of t ..."
Abstract
-
Cited by 106 (34 self)
- Add to MetaCart
of transitions between states of the world (i.e., states of complete knowledge) as a special case, proving to be very flexible. In the present Part II, we describe the DLV planning system, which implements K on top of the disjunctive logic programming system DLV. This novel planning system allows for solving
Stateful UML Design with Security Constraints for Information Assurance
"... The design of software applications using UML embodies an incremental process, transitioning a design from state to state over time. The integration of security, namely, role-based access control (RBAC) and mandatory access control (MAC), into this process is critical, dictated by the increasing nee ..."
Abstract
- Add to MetaCart
.) and connections (e.g., inheritance, association, etc.) are added, modified, and deleted. As a result, the framework is able to capture and check snapshots of each design state containing security constraints and insures that information assurance with respect to the application’s security requirements is always
Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces
, 2000
"... Many emerging application domains require database systems to support efficient access over highly multidimensional datasets. The current state-of-the-art technique to indexing high dimensional data is to first reduce the dimensionality of the data using Principal Component Analysis and then in ..."
Abstract
-
Cited by 119 (2 self)
- Add to MetaCart
Many emerging application domains require database systems to support efficient access over highly multidimensional datasets. The current state-of-the-art technique to indexing high dimensional data is to first reduce the dimensionality of the data using Principal Component Analysis
Emerging Radiation Hardness Assurance (RHA) Issues: A NASA Approach for Space Flight Programs
- IEEE Transactions on Nuclear Science
, 1998
"... Abstract Spacecraft performance requirements drive the utilization of commercial-off-the-shelf (COTS) components and emerging technologies in systems. The response of these technologies to radiation is often complex. This engenders a set of emerging radiation hardness assurance (RHA) issues which i ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
Abstract Spacecraft performance requirements drive the utilization of commercial-off-the-shelf (COTS) components and emerging technologies in systems. The response of these technologies to radiation is often complex. This engenders a set of emerging radiation hardness assurance (RHA) issues which
State of the art
, 2011
"... Existing static graph models mainly follow two approaches. Random modelling consists in randomly sampling, with uniform probability, a graph among the set of those that have a given property, see for instance [2, 4, 8, 12, 17]. Other models take the form of an iterative construction process that eve ..."
Abstract
- Add to MetaCart
Existing static graph models mainly follow two approaches. Random modelling consists in randomly sampling, with uniform probability, a graph among the set of those that have a given property, see for instance [2, 4, 8, 12, 17]. Other models take the form of an iterative construction process
Achieving Security Assurance with Assertion-based Application Construction
"... Abstract—Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application program-ming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal ..."
Abstract
- Add to MetaCart
assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques. I.
1MULTI-DOMAIN SURETY MODELING AND ANALYSIS FOR HIGH ASSURANCE SYSTEMS
"... Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design. ..."
Abstract
- Add to MetaCart
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design
Results 1 - 10
of
527