Sciweavers

152 search results - page 27 / 31
» A Practical Agent-Based Approach for Pattern Layout Design
Sort
View
NSPW
2004
ACM
14 years 24 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ECEASST
2010
13 years 2 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
KDD
2004
ACM
151views Data Mining» more  KDD 2004»
14 years 7 months ago
Feature selection in scientific applications
Numerous applications of data mining to scientific data involve the induction of a classification model. In many cases, the collection of data is not performed with this task in m...
Erick Cantú-Paz, Shawn Newsam, Chandrika Ka...
HRI
2009
ACM
14 years 2 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...
PIMRC
2008
IEEE
14 years 1 months ago
Radio-Triggered Wake-ups with Addressing Capabilities for extremely low power sensor network applications
Sensor network applications are generally characterized by long idle durations and intermittent communication patterns. The traffic loads are typically so low that overall idle d...
Junaid Ansari, Dmitry Pankin, Petri Mähö...