Sciweavers

1352 search results - page 96 / 271
» Designing Security Requirements Models Through Planning
Sort
View
LISA
2004
13 years 10 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ROBOCUP
2007
Springer
153views Robotics» more  ROBOCUP 2007»
14 years 3 months ago
Model-Based Reinforcement Learning in a Complex Domain
Reinforcement learning is a paradigm under which an agent seeks to improve its policy by making learning updates based on the experiences it gathers through interaction with the en...
Shivaram Kalyanakrishnan, Peter Stone, Yaxin Liu
EUROMICRO
2003
IEEE
14 years 2 months ago
A General Model for Component-Based Software Reliability
: The approach of aggregating components into complex software systems is maturing with the rapid development of component technology. How to analyze software reliability from syst...
Mao Xiaoguang, Deng Yongjin
CSE
2009
IEEE
14 years 3 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
AGENTS
2001
Springer
14 years 1 months ago
The intelligent classroom: providing competent assistance
In the software industry, designers are forever trying to “improve” their products by adding ever more features to them, producing bloated software systems that are capable of...
David Franklin, Kristian J. Hammond