Sciweavers

95 search results - page 14 / 19
» Assessing Trust in Uncertain Information
Sort
View
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
AAAI
2006
13 years 8 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CHI
1999
ACM
13 years 11 months ago
The Elements of Computer Credibility
Given the importance of credibility in computing products, the research on computer credibility is relatively small. To enhance knowledge about computers and credibility, we defin...
B. J. Fogg, Hsiang Tseng
AGILE
2009
Springer
264views GIS» more  AGILE 2009»
14 years 2 months ago
Three-Valued 9-Intersection for Deriving Possible Topological Relations from Incomplete Observations
Topological relations, which concern how two objects intersect, are one of the most fundamental and well-studied spatial relations. Typically, topological relations are distinguis...
Yohei Kurata
KI
2009
Springer
14 years 2 months ago
Constraint-Based Integration of Plan Tracking and Prognosis for Autonomous Production
Today’s complex production systems allow to simultaneously build different products following individual production plans. Such plans may fail due to component faults or unfores...
Paul Maier, Martin Sachenbacher, Thomas Rühr,...