Sciweavers

1061 search results - page 65 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
CDC
2010
IEEE
110views Control Systems» more  CDC 2010»
13 years 2 months ago
Multi-step-ahead multivariate predictors: A comparative analysis
Abstract-- The focus of this article is to undertake a comparative analysis of multi-step-ahead linear multivariate predictors. The approach considered for the estimation will be b...
Marzia Cescon, Rolf Johansson
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 4 days ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
IRI
2006
IEEE
14 years 1 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
DMS
2008
167views Multimedia» more  DMS 2008»
13 years 9 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far
EDOC
2006
IEEE
13 years 11 months ago
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows
Abstract-- Analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger ...
Rainer Hauser, Michael Friess, Jochen Malte Kü...