Sciweavers

979 search results - page 86 / 196
» Developing Dynamic Security Policies
Sort
View
IWAN
2000
Springer
14 years 1 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
RTSS
2003
IEEE
14 years 3 months ago
Addressing Timeliness/Accuracy/Cost Tradeoffs in Information Collection for Dynamic Environments
In this paper, we focus on addressing the tradeoffs between timeliness, accuracy and cost for applications requiring real-time information collection in distributed real-time envi...
Qi Han, Nalini Venkatasubramanian
AAMAS
2011
Springer
13 years 5 months ago
Optimizing coalition formation for tasks with dynamically evolving rewards and nondeterministic action effects
We consider a problem domain where coalitions of agents are formed in order to execute tasks. Each task is assigned at most one coalition of agents, and the coalition can be reorg...
Majid Ali Khan, Damla Turgut, Ladislau Böl&ou...
ISF
2007
104views more  ISF 2007»
13 years 10 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager
CCS
2007
ACM
14 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...