Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailHow to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems
Gadyatskaya, Olga UL

in Proc. of GraMSec 2015 (2016)

Recently security researchers have started to look into au- tomated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is au ... [more ▼]

Recently security researchers have started to look into au- tomated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is au- tomating the selection of security controls to treat the detected threats. However, the existing socio-technical models are too abstract to repre- sent all security controls recommended by practitioners and standards. In this paper we propose an attack-defence model, consisting of a set of attack-defence bundles, to be generated and maintained with the socio- technical model. The attack-defence bundles can be used to synthesise attack-defence trees directly from the model to o er basic attack-defence analysis, but also they can be used to select and maintain the security controls that cannot be handled by the model itself. [less ▲]

Detailed reference viewed: 121 (5 UL)
See detailhow to get them hooked; An alternative approach to a Digital Humanities Workshop
Scagliola, Stefania UL

in Scagliola, Stefania (Ed.) how to get them hooked; An alternative approach to a Digital Humanities Workshop (2016)

The challenge of leading a workshop with the goal of bringing scholars together and teach them how to apply a number of basic digital tools on a dataset of military memoires.

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailHow to grasp historical media dispositifs in practice?
Fickers, Andreas UL

in Fickers, Andreas; Aasman, Susan; Wachelder, Joseph (Eds.) Materializing Memories. Dispositifs, Generations, Technologies (2018)

This chapter introduces the concept of experimental media archaeology and asks how hands-on experiments with old media technologies allow to grasp the meaning of past media practices.

Detailed reference viewed: 268 (10 UL)
Full Text
Peer Reviewed
See detailHow to import the concept of conviviality to web communities
Caire, Patrice UL

in International Journal of Web-Based Communities (2009), 3

Detailed reference viewed: 79 (0 UL)
Peer Reviewed
See detailHow to Integrate Culture into Economics? Some Reflections on an Old and still Challenging Research Agenda
Klump, Rainer UL

in Economic Styles in the Process of EU Eastern Enlargement (2009)

Detailed reference viewed: 73 (2 UL)
Full Text
Peer Reviewed
See detailHow to know one's experiences transparently
Hofmann, Frank UL

in Philosophical Studies (2018)

Detailed reference viewed: 62 (2 UL)
Full Text
See detailHow to launch an ad-hoc query on the new EMN-IES - Quick reference manual
Sommarribas, Adolfo UL

Learning material (2019)

This is a quick reference manual in order that an individual can learn how to use the ad-hoc query module in the EMN-IES

Detailed reference viewed: 58 (1 UL)
Full Text
Peer Reviewed
See detailHow to make sure your paper is desk rejected. A practical guide to rejection in EJPA
Greiff, Samuel UL; Ziegler, M.

in European Journal of Psychological Assessment (2017), 33

Detailed reference viewed: 115 (6 UL)
See detailHow to measure aggressive behavior in the lab?
Melzer, André UL

Presentation (2015, February 02)

Detailed reference viewed: 65 (1 UL)
See detailHow to measure Collaborative Problem Solving
Greiff, Samuel UL

Presentation (2013, February 04)

Detailed reference viewed: 45 (1 UL)
See detailHow to measure Collaborative Problem Solving? Some item prototypes
Greiff, Samuel UL; Martin, Romain UL

Presentation (2012, November 12)

Detailed reference viewed: 44 (1 UL)
See detailHow to measure complex problem solving: Ideas, approach & software
Greiff, Samuel UL

Presentation (2009, November 11)

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detailHow to Measure Motivational Interviewing Fidelity in Randomized Controlled Trials: Practical Recommendations.
Jelsma, J.; Mertens, Vera-Christina UL; Forsberg, L. et al

in Contemporary Clinical Trials (2015), 43

Detailed reference viewed: 93 (1 UL)
See detailHow to prevent cyberbullying and cybergrooming
Steffgen, Georges UL

Conference given outside the academic context (2014)

Detailed reference viewed: 78 (0 UL)
Peer Reviewed
See detailHow to Program Organizations and Roles in the JADE Framework
Baldoni, Matteo; Boella, Guido UL; Genovese, Valerio UL et al

in Multiagent System Technologies, 6th German Conference, MATES 2008, Kaiserslautern, Germany, September 23-26, 2008. Proceedings (2008)

The organization metaphor is often used in the design and implementation of multiagent systems. However, few agent programming languages provide facilities to define them. Several frameworks are proposed ... [more ▼]

The organization metaphor is often used in the design and implementation of multiagent systems. However, few agent programming languages provide facilities to define them. Several frameworks are proposed to coordinate MAS with organizations, but they are not programmable with general purpose languages. In this paper we extend the JADE framework with primitives to program in Java organizations structured in roles, and to enable agents to play roles in organizations. Roles facilitate the coordination of agents inside an organization and offer new abilities (powers) in the context of organizations to the agents which satisfy the requirements necessary to play the roles. To program organizations and roles, we provide primitives which enable an agent to enact a new role in an organization to invoke powers. [less ▲]

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailHow to prove the validity of a complex ballot encryption to the voter and the public
Joaquim, Rui UL

in Journal of Information Security and Applications (2014)

One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that the vote encryption is well-formed, i.e. the proof that the vote encryption encrypts a valid vote ... [more ▼]

One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that the vote encryption is well-formed, i.e. the proof that the vote encryption encrypts a valid vote accordingly to the race specification. It makes no sense accepting an encrypted vote if, at the end of the election, the vote cannot be included in the tally because it is badly formed. Proving the validity of a complex vote encryption, without revealing the vote, is a hard problem. This paper first contribution addresses exactly that problem and provides a set of new constructions to create a vote encryption and the corresponding public proof of validity for several types of complex ballots ([kmin,kmax]-out-of-n approval, weighted and ranked ballots). The second contribution is a technique that allows to create a single, constant size, verification code for a ballot containing one or several races of any mix of the race types considered. With this single verification code the voter can verify that her vote was cast-as-intended. Moreover, our constructions can be tuned for either mix net or homomorphic tallying and support both types of tallying in the same multi-race ballot. [less ▲]

Detailed reference viewed: 141 (1 UL)
Full Text
Peer Reviewed
See detailHow to Regulate Bitcoin? Decentralized Regulation for a Decentralized Cryptocurrency
Nabilou, Hossein UL

in International Journal of Law and Information Technology (2019)

Bitcoin is a distributed system. The greatest dilemma it poses to the current legal and regulatory systems is that it is hardly possible to regulate a distributed network in a centralized fashion as ... [more ▼]

Bitcoin is a distributed system. The greatest dilemma it poses to the current legal and regulatory systems is that it is hardly possible to regulate a distributed network in a centralized fashion as decentralized permissionless blockchain-based cryptocurrencies are antithetical to the existing centralized structure of monetary and financial regulation. By shifting the policy debate from whether to regulate bitcoin and other decentralized cryptocurrencies to how to regulate them, this paper proposes a more nuanced policy recommendation for regulatory intervention in the cryptocurrency ecosystem. This policy approach relies on a decentralized regulatory architecture that is built upon the existing regulatory infrastructure and makes use of the existing as well as the emerging middlemen in the industry. It argues that instead of regulating the technology or the cryptocurrencies at the code or protocol layer, which might not be desirable, even if feasible, the regulation should target the applications and use-cases of cryptocurrencies. Such a regulatory strategy can best be implemented through directing the edicts and interdictions of regulation towards the middlemen, and can be enforced by the existing financial market participants and traditional gatekeepers such as banks, payment service providers and exchanges, as well as new emerging participants, such as large and centralized node operators and miners that are likely to replicate the functions of the traditional gatekeepers. [less ▲]

Detailed reference viewed: 361 (12 UL)