Sciweavers

7504 search results - page 187 / 1501
» Computing with Action Potentials
Sort
View
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 9 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
IVS
2008
90views more  IVS 2008»
13 years 8 months ago
Jigsaw: supporting investigative analysis through interactive visualization
Investigative analysts who work with collections of text documents connect embedded threads of evidence in order to formulate hypotheses about plans and activities of potential in...
John T. Stasko, Carsten Görg, Zhicheng Liu
CJ
1998
63views more  CJ 1998»
13 years 7 months ago
Protecting IT Systems from Cyber Crime
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnec...
R. Benjamin, B. Gladman, Brian Randell
ATAL
2004
Springer
14 years 1 months ago
An Intent-Driven Planner for Multi-Agent Story Generation
The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. We identify two properties of ...
Mark O. Riedl, R. Michael Young
EWRL
2008
13 years 10 months ago
Optimistic Planning of Deterministic Systems
If one possesses a model of a controlled deterministic system, then from any state, one may consider the set of all possible reachable states starting from that state and using any...
Jean-François Hren, Rémi Munos