Adaptive Reasoning in the Presence of Imperfect Security Requirements
暂无分享,去创建一个
[1] Svetha Venkatesh,et al. Dynamic Privacy in Public Surveillance , 2009, Computer.
[2] Holger Giese,et al. Living with Uncertainty in the Age of Runtime Models , 2014, Models@run.time@Dagstuhl.
[3] Bradley R. Schmerl,et al. Software Engineering for Self-Adaptive Systems: A Second Research Roadmap , 2010, Software Engineering for Self-Adaptive Systems.
[4] Sara Sartoli,et al. Poster: Reasoning Based on Imperfect Context Data in Adaptive Security , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[5] Martin Gebser,et al. clasp : A Conflict-Driven Answer Set Solver , 2007, LPNMR.
[6] Mary Shaw,et al. Engineering Self-Adaptive Systems through Feedback Loops , 2009, Software Engineering for Self-Adaptive Systems.
[7] Miroslaw Truszczynski,et al. Answer set programming at a glance , 2011, Commun. ACM.
[8] F. Beaufils,et al. FRANCE , 1979, The Lancet.
[9] Gordon S. Blair,et al. Models@ run.time , 2009, Computer.