Sciweavers

804 search results - page 94 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
135
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
129
Voted
SASO
2008
IEEE
15 years 11 months ago
Autonomic Resource Management through Self-Organising Agent Communities
In this paper, we analyse how autonomic resource management can be achieved within a system that lacks centralized information about current system demand and the state of system ...
Mariusz Jacyno, Seth Bullock, Terry R. Payne, Nick...
138
Voted
UIST
2006
ACM
15 years 10 months ago
Using a low-cost electroencephalograph for task classification in HCI research
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...
Johnny Chung Lee, Desney S. Tan
ATAL
2005
Springer
15 years 10 months ago
A distributed framework for solving the Multiagent Plan Coordination Problem
We examine whether and how the Multiagent Plan Coordination Problem, the problem of resolving interactions between the plans of multiple agents, can be cast as a Distributed Const...
Jeffrey S. Cox, Edmund H. Durfee, Thomas Bartold
129
Voted
EH
2004
IEEE
149views Hardware» more  EH 2004»
15 years 8 months ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...