Sciweavers

653 search results - page 95 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
CLIMA
2006
13 years 10 months ago
Hierarchical Decision Making in Multi-agent Systems Using Answer Set Programming
We present a multi-agent formalism based on extended answer set programming. The system consists of independent agents connected via a communication channel, where knowledge and be...
Davy Van Nieuwenborgh, Marina De Vos, Stijn Heyman...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ADVCS
2008
140views more  ADVCS 2008»
13 years 9 months ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir
FSS
2006
140views more  FSS 2006»
13 years 9 months ago
Advances and challenges in interval-valued fuzzy logic
Among the various extensions to the common [0, 1]-valued truth degrees of "traditional" fuzzy set theory, closed intervals of [0, 1] stand out as a particularly appealin...
Chris Cornelis, Glad Deschrijver, Etienne E. Kerre
ERSA
2006
197views Hardware» more  ERSA 2006»
13 years 10 months ago
A High Speed, Run Time Reconfigurable Image Acquisition processor for a Missile Approach Warning System
High frame rate video capture and image processing is an important capability for applications in defense and homeland security where incoming missiles must be detected in very sh...
Vinay Sriram, David Kearney