Sciweavers

1352 search results - page 116 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AIS
2005
Springer
13 years 10 months ago
Computer decision-support systems for public argumentation: assessing deliberative legitimacy
Recent proposals for computer-assisted argumentation have drawn on dialectical models of argumentation. When used to assist public policy planning, such systems also raise questio...
William Rehg, Peter McBurney, Simon Parsons
WEBI
2009
Springer
14 years 4 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
ATAL
2006
Springer
14 years 1 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
14 years 2 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
ISI
2006
Springer
13 years 10 months ago
Multi-document Summarization for Terrorism Information Extraction
Abstract. Counterterrorism is one of the major challenges to the society. In order to flight again the terrorists, it is very important to have a through understanding of the terro...
Fu Lee Wang, Christopher C. Yang, Xiaodong Shi