Applying the Blackboard Model in the Security Field

نویسنده

  • Simeon Xenitellis
چکیده

The blackboard model is a flexible problem-solving approach that can be used in domains where the data and the knowledge rules are strictly separated [7]. It is used in a variety of fields such as speech recognition or optical character recognition. In this document we discuss the use of the blackboard model in the security field and the automatic detection of programming mistakes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

A Mathematical Model of Optimal Budget Allocation Based on Performance in the Social Security Organization

This research aims to provide a performance-based budgeting model in the social security organization which has independent and similar departments across the country. The statistical population of this research is the Social Security Organization Insurance's department. Following the library reviews and adapted from the performance indicators of the subcommittee of the insurance company's depu...

متن کامل

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

Using Weibull probability distribution to calibrate prevailing wind applying in oil spill simulation

In the Persian Gulf, the major source of oil pollution is related to the transportation of tankers, offshore production and discharges by coastal refineries. The water dynamical field has been obtained using a new hydrodynamic model. Local wind is recognized as the principal driving force combining to the water dynamic field to determine oil drift on the sea surface. The Weibull probability dis...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002