Sciweavers

2189 search results - page 239 / 438
» A Graded Applicability of Rules
Sort
View
ICICS
2005
Springer
14 years 2 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
DIS
2004
Springer
14 years 2 months ago
On the Convergence of Incremental Knowledge Base Construction.
Abstract. Ripple Down Rules is a practical methodology to build knowledgebased systems, which has proved successful in a wide range of commercial applications. However, little work...
Tri M. Cao, Eric Martin, Paul Compton
ICDM
2003
IEEE
126views Data Mining» more  ICDM 2003»
14 years 2 months ago
Mining Relevant Text from Unlabelled Documents
Automatic classification of documents is an important area of research with many applications in the fields of document searching, forensics and others. Methods to perform class...
Daniel Barbará, Carlotta Domeniconi, Ning K...
AE
2003
Springer
14 years 2 months ago
The Evolutionary Control Methodology: An Overview
The ideas proposed in this work are aimed to describe a novel approach based on artificial life (alife) environments for on-line adaptive optimisation of dynamical systems. The bas...
Mauro Annunziato, Ilaria Bertini, M. Lucchetti, Al...
CCS
2003
ACM
14 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...