Sciweavers

326 search results - page 45 / 66
» Can Affect Be Detected from Intelligent Tutoring System Inte...
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
FLAIRS
2004
13 years 9 months ago
Developing Task Specific Sensing Strategies Using Reinforcement Learning
Robots that can adapt and perform multiple tasks promise to be a powerful tool with many applications. In order to achieve such robots, control systems have to be constructed that...
Srividhya Rajendran, Manfred Huber
VLDB
2002
ACM
116views Database» more  VLDB 2002»
13 years 7 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
ESAW
2004
Springer
14 years 1 months ago
Managing Conflicts Between Individuals and Societies in Multi-agent Systems
The development of multi-agent systems (MAS) implies considering both the social and individual levels of these systems. However, the elements in these levels are not necessarily c...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
ATAL
2009
Springer
14 years 2 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen