Sciweavers

529 search results - page 50 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
ACL
2006
13 years 9 months ago
Novel Association Measures Using Web Search with Double Checking
A web search with double checking model is proposed to explore the web as a live corpus. Five association measures including variants of Dice, Overlap Ratio, Jaccard, and Cosine, ...
Hsin-Hsi Chen, Ming-Shun Lin, Yu-Chuan Wei
ACOM
2006
Springer
14 years 1 months ago
Temporal Logics for Representing Agent Communication Protocols
Abstract. This paper explores the use of temporal logics in the context of communication protocols for multiagent systems. We concentrate on frameworks where protocols are used to ...
Ulle Endriss
ISORC
2000
IEEE
14 years 2 days ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
WIMOB
2008
IEEE
14 years 2 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COLING
2002
13 years 7 months ago
An Agent-based Approach to Chinese Named Entity Recognition
Chinese NE (Named Entity) recognition is a difficult problem because of the uncertainty in word segmentation and flexibility in language structure. This paper proposes the use of ...
Shiren Ye, Tat-Seng Chua, Jimin Liu