Sciweavers

2780 search results - page 530 / 556
» Agents in Proactive Environments
Sort
View
ISSA
2004
13 years 11 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
FLAIRS
2003
13 years 11 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
INTERACT
2003
13 years 11 months ago
Programmorphosis: a Knowledge-Based Approach to End-User Programming
: Whereas sophisticated computer users can exercise more control in what they are exposed to and produce computational artifacts, technologically challenged end-users assume a more...
Andri Ioannidou
MMNS
2003
135views Multimedia» more  MMNS 2003»
13 years 11 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
NAACL
2003
13 years 11 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith