Sciweavers

524 search results - page 86 / 105
» An Agent Model for Personal Development Support
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ICSE
2000
IEEE-ACM
13 years 11 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
AAAI
2007
13 years 10 months ago
A Randomized String Kernel and Its Application to RNA Interference
String kernels directly model sequence similarities without the necessity of extracting numerical features in a vector space. Since they better capture complex traits in the seque...
Shibin Qiu, Terran Lane, Ljubomir J. Buturovic
AAAI
2012
11 years 10 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
CI
2004
115views more  CI 2004»
13 years 7 months ago
A Conversational Approach to the Interaction With Web Services
The emerging standards for the specification of Web Services support the publication of the static interfaces of the operations they may execute. However, little attention is paid...
Liliana Ardissono, Giovanna Petrone, Marino Segnan