The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Content publishing and distribution often occurs in a costly and inefficient manner via client/server networks. Client/server models exhibit negative network externalities in that...
Abstract— This paper deals with the use of Bayesian Networks to compute system reliability of complex systems under epistemic uncertainty. In the context of incompleteness of rel...
: The Minerals Management Service Pipeline Oil Spill Volume Estimation Model (POSVEM) is a computer-based methodology to estimate discharges from seafloor pipelines. The system is ...
Mark Reed, Morten H. Emilsen, Ben Hetland, Ø...
Abstract. Dialogue moves influence and are influenced by the agents’ preferences. We propose a method for modelling this interaction. We motivate and describe a recursive metho...