Sciweavers

733 search results - page 118 / 147
» A Logic Programming View of Authorization in Distributed Sys...
Sort
View
CCGRID
2005
IEEE
14 years 12 days ago
Semantic integration of file-based data for grid services
Data services for the Grid have focussed so far primarily on virtualising access to distributed databases, and encapsulating file location. However, orchestration of services requ...
Andrew Woolf, Ray Cramer, Marta Gutierrez, Kerstin...
EDOC
2007
IEEE
14 years 1 months ago
Business Process Integration by Using General Rule Markup Language
A business process usually includes multiple business partners that use systems with their business logics represented in different rule (or policy) languages. The integration of ...
Milan Milanovic, Nima Kaviani, Dragan Gasevic, Adr...
IWIA
2005
IEEE
14 years 11 days ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
13 years 7 months ago
Scaling ant colony optimization with hierarchical reinforcement learning partitioning
This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. Th...
Erik J. Dries, Gilbert L. Peterson
CCS
2007
ACM
14 years 29 days ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...