Sciweavers

84 search results - page 7 / 17
» Finding and transferring policies using stored behaviors
Sort
View
CEAS
2006
Springer
13 years 11 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
IMC
2010
ACM
13 years 5 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
KI
2007
Springer
14 years 1 months ago
Options in Readylog Reloaded - Generating Decision-Theoretic Plan Libraries in Golog
Readylog is a logic-based agent programming language and combines many important features from other Golog dialects. One of the features of Readylog is to make use of decision-theo...
Lutz Böhnstedt, Alexander Ferrein, Gerhard La...
IOR
2006
72views more  IOR 2006»
13 years 7 months ago
Inventory Policies in a Decentralized Assembly System
We consider a system in which a single finished good is assembled from two components. Demand for the finished product is stochastic and stationary, and procurement and assembly l...
Fernando Bernstein, Gregory A. DeCroix
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 8 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar