Sciweavers

2808 search results - page 503 / 562
» Mobile Agent Security
Sort
View
ATAL
2006
Springer
14 years 1 months ago
MLBP: MAS for large-scale biometric pattern recognition
Abstract. Security systems can observe and hear almost anyone everywhere. However, it is impossible to employ an adequate number of human experts to analyze the information explosi...
Ram Meshulam, Shulamit Reches, Aner Yarden, Sarit ...
AIIA
2005
Springer
13 years 12 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
AAAI
2006
13 years 11 months ago
Bookmark Hierarchies and Collaborative Recommendation
GiveALink.org is a social bookmarking site where users may donate and view their personal bookmark files online securely. The bookmarks are analyzed to build a new generation of i...
Benjamin Markines, Lubomira Stoilova, Filippo Menc...
AAAI
2000
13 years 11 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
ATAL
2011
Springer
12 years 10 months ago
Solving Stackelberg games with uncertain observability
Recent applications of game theory in security domains use algorithms to solve a Stackelberg model, in which one player (the leader) first commits to a mixed strategy and then th...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr