Sciweavers

811 search results - page 113 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
ECUMN
2007
Springer
14 years 2 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
ITS
2000
Springer
128views Multimedia» more  ITS 2000»
14 years 10 days ago
Active Learner Modelling
Abstract. It is common to think of a "learner model" as a global description of a student's understanding of domain content. We propose a notion of learner model whe...
Gordon I. McCalla, Julita Vassileva, Jim E. Greer,...
TEI
2009
ACM
106views Hardware» more  TEI 2009»
14 years 3 months ago
Spime builder: a tangible interface for designing hyperlinked objects
Ubiquitous computing is fostering an explosion of physical artifacts that are coupled to digital information – so-called Spimes. We introduce a tangible workbench that allows fo...
Leonardo Bonanni, Greg Vargas, Neil Chao, Stephen ...
AGS
2009
Springer
14 years 3 months ago
Pogamut 3 Can Assist Developers in Building AI (Not Only) for Their Videogame Agents
Many research projects oriented on control mechanisms of virtual agents in videogames have emerged in recent years. However, this boost has not been accompanied with the emergence ...
Jakub Gemrot, Rudolf Kadlec, Michal Bída, O...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok