Sciweavers

792 search results - page 149 / 159
» Mixed-initiative security agents
Sort
View
ATAL
2004
Springer
14 years 1 months ago
Teaching and Working with Robots as a Collaboration
New applications for autonomous robots bring them into the human environment where they are to serve as helpful assistants to untrained users in the home or office, or work as ca...
Cynthia Breazeal, Guy Hoffman, Andrea Lockerd
POLICY
2004
Springer
14 years 1 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 28 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
DSN
2002
IEEE
14 years 18 days ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
WETICE
2002
IEEE
14 years 16 days ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...