It is the experience of many corporate organizations that information security solutions are often designed, acquired and installed on a tactical basis. A requirement is identified, a specification is developed and a solution is sought to meet that situation. In this process there is no opportunity
โฆ LIBER โฆ
A Verification Method for a Commitment Strategy of the BDI Architecture
โ Scribed by Tadashi Araragi; Shiro Takata; Nide Naoyuki
- Publisher
- Elsevier Science
- Year
- 2002
- Tongue
- English
- Weight
- 195 KB
- Volume
- 70
- Category
- Article
- ISSN
- 1571-0661
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
SALSA: A method for developing the enter
โ
John Sherwood
๐
Article
๐
1996
๐
Elsevier Science
๐
English
โ 619 KB
SALSA: A method for developing the enter
๐
Article
๐
1996
๐
Elsevier Science
๐
English
โ 110 KB
An implementation and verification of a
โ
Masafumi Oe; Youki Kadobayashi
๐
Article
๐
2004
๐
John Wiley and Sons
๐
English
โ 493 KB
## Abstract IP traceback is a technique to combat distributed denial of service attacks. This technique can specify the routers in the path of the attack flow with forged source addresses. Although several techniques have been proposed to solve this problem, a variety of problems arise when operati
The strategy wheel: A method for analysi
โ
Rado P. Kotorov
๐
Article
๐
2001
๐
John Wiley and Sons
โ 226 KB
Methods for the seismic verification of
โ
A. Martelli; M. Forni; P.G. Muratori; G. Bonacina
๐
Article
๐
1985
๐
Elsevier Science
๐
English
โ 917 KB
A versatile method of verification test
โ
Masaaki Takehisa
๐
Article
๐
1995
๐
Elsevier Science
๐
English
โ 239 KB