Sciweavers

1532 search results - page 248 / 307
» An analysis of additivity in OLAP systems
Sort
View
MATES
2010
Springer
13 years 7 months ago
Do You Get It? User-Evaluated Explainable BDI Agents
Abstract. In this paper we focus on explaining to humans the behavior of autonomous agents, i.e., explainable agents. Explainable agents are useful for many reasons including scena...
Joost Broekens, Maaike Harbers, Koen V. Hindriks, ...
SOSYM
2010
176views more  SOSYM 2010»
13 years 7 months ago
On challenges of model transformation from UML to Alloy
Abstract The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Arch...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
FMICS
2010
Springer
13 years 7 months ago
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurr...
Radu Mateescu, Wendelin Serwe
RAID
2010
Springer
13 years 6 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 6 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto