Search

Your search keyword '"Polack, Fiona"' showing total 45 results

Search Constraints

Start Over You searched for: Author "Polack, Fiona" Remove constraint Author: "Polack, Fiona" Publisher springer nature Remove constraint Publisher: springer nature
45 results on '"Polack, Fiona"'

Search Results

1. Trustworthy agent-based simulation: the case for domain-specific modelling languages.

4. Filling gaps in simulation of complex systems: the background and motivation for CoSMoS.

5. Principled simulation of cell proliferation dynamics using the CoSMoS approach.

9. Self-organisation for Survival in Complex Computer Architectures.

10. Evaluating Goal-Oriented Analysis in the Domain of Enterprise Information Systems.

11. Constructing and Navigating Non-invasive Model Decorations.

12. Model Migration with Epsilon Flock.

13. A Comparison of Model Migration Tools.

14. Taming EMF and GMF Using Model Transformation.

15. Concordance: A Framework for Managing Model Integrity.

16. The Grand Challenge of Scalability for Model Driven Engineering.

17. On the Evolution of OCL for Capturing Structural Constraints in Modelling Languages.

18. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity.

19. The Epsilon Transformation Language.

20. Neutral Emergence and Coarse Graining.

21. Merging models with the epsilon merging language (EML).

22. Attribute-Based Authentication Model for Dynamic Mobile Environments.

23. Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.

24. Information Flow Control to Secure Dynamic Web Service Composition.

25. Securing Information Gateways with Derivation-Constrained Access Control.

26. Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.

27. Privacy Sensitive Location Information Systems in Smart Buildings.

28. Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security.

29. The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.

30. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.

31. Higher Dependability and Security for Mobile Applications.

32. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.

33. Delegating Secure Logging in Pervasive Computing Systems.

34. Low Rate DoS Attack to Monoprocess Servers.

35. Forward Secure Communication in Wireless Sensor Networks.

36. Enabling Secure Discovery in a Pervasive Environment.

37. Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.

38. The Epsilon Object Language (EOL).

39. A Formal Template Language Enabling Metaproof.

40. An Architecture for Modelling Emergence in CA-Like Systems.

41. An Object-Oriented Structuring for Z Based on Views.

42. An Agile and Extensible Code Generation Framework.

43. Epsilon Flock: a model migration language.

44. Trust Without Identification.

45. Formal Analysis in Model Management: Exploiting the Power of CZT.

Catalog

Books, media, physical & digital resources