When security meets software engineering: a case of modelling secure information systems Fulltext Access 21 Pages 2005
RBAC for Organisation and Security in an Agent Coordination Infrastructure Fulltext Access 21 Pages 2005
Securing Statically-verified Communications Protocols Against Timing Attacks Fulltext Access 21 Pages 2005
Fluid Stochastic Petri Nets for Computing Transfer Time Distributions in Peer-to-Peer File Sharing Applications Fulltext Access 21 Pages 2005
A Proof Calculus for Natural Semantics Based on Greatest Fixed Point Semantics Fulltext Access 21 Pages 2005
Deliberation in a metadata-based modeling and simulation environment for inter-organizational networks Fulltext Access 21 Pages 2005
On the query refinement in the ontology-based searching for information Fulltext Access 21 Pages 2005
A methodology and tool support for managing business rules in organisations Fulltext Access 21 Pages 2005
Expanding selfsimilar solutions of a crystalline flow with applications to contour figure analysis Fulltext Access 21 Pages 2005
Performance Evaluation of a Real-time Simulation Architecture using Probabilistic Model Checking Fulltext Access 22 Pages 2005
A Bayesian approach to paired comparison rankings based on a graphical model Fulltext Access 22 Pages 2005
Exploiting locality for scalable information retrieval in peer-to-peer networks Fulltext Access 22 Pages 2005
Separable equilibrium state probabilities via time reversal in Markovian process algebra Fulltext Access 22 Pages 2005
An Input/Output Semantics for Distributed Program Equivalence Reasoning Fulltext Access 22 Pages 2005
Optimal semi-online preemptive algorithms for machine covering on two uniform machines Fulltext Access 22 Pages 2005
BITAM: An engineering-principled method for managing misalignments between business and IT architectures Fulltext Access 22 Pages 2005
Additive sparse spanners for graphs with bounded length of largest induced cycle Fulltext Access 22 Pages 2005
Reflection Into Models of Finite Decidable FP-sketches in an Arithmetic Universe Fulltext Access 22 Pages 2005
What's the Name of the Game? Formal Specification of Artificial Intelligence Games Fulltext Access 22 Pages 2005
Algorithms for pattern matching and discovery in RNA secondary structure Fulltext Access 23 Pages 2005
Metareasoning about Security Protocols using Distributed Temporal Logic Fulltext Access 23 Pages 2005
Fuzzy context-free languages-Part 2: Recognition and parsing algorithms Fulltext Access 23 Pages 2005
Protocol Performance Analysis Using a Timed Extension for an Object Oriented Petri Net Language Fulltext Access 23 Pages 2005
Weak bisimilarity and regularity of context-free processes is EXPTIME-hard Fulltext Access 23 Pages 2005
A sufficient condition for non-uniqueness in binary tomography with absorption Fulltext Access 23 Pages 2005
An introduction to periodical discrete sets from a tomographical perspective Fulltext Access 23 Pages 2005