Sciweavers

757 search results - page 17 / 152
» How to decide
Sort
View
IANDC
2008
150views more  IANDC 2008»
13 years 7 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
IAT
2007
IEEE
14 years 2 months ago
Analysis of Multi-Actor Policy Contexts Using Perception Graphs
Policy making is a multi-actor process: it involves a variety of actors, each trying to further their own interests. How these actors decide and act largely depends on the way the...
Pieter W. G. Bots
JCIT
2008
103views more  JCIT 2008»
13 years 7 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
ERCIMDL
2007
Springer
81views Education» more  ERCIMDL 2007»
14 years 1 months ago
Investigating Document Triage on Paper and Electronic Media
Abstract. Document triage is the critical point in the information seeking process when the user first decides the relevance of a document to their information need. This complex ...
George Buchanan, Fernando Loizides
ISDA
2005
IEEE
14 years 1 months ago
Agent-oriented Design for Network Survivability
Intelligent behavior is the selection of actions based on knowledge. The design of the Fuzzy Adaptive Survivability Tool (FAST) agents and their intelligent behavior is explained....
Mehdi Shajari, Ali A. Ghorbani