Sciweavers

2131 search results - page 222 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
IEEEARES
2008
IEEE
15 years 10 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
VLDB
2004
ACM
115views Database» more  VLDB 2004»
15 years 9 months ago
Semantic Mining and Analysis of Gene Expression Data
Association rules can reveal biological relevant relationship between genes and environments / categories. However, most existing association rule mining algorithms are rendered i...
Xin Xu, Gao Cong, Beng Chin Ooi, Kian-Lee Tan, Ant...
CMS
2006
127views Communications» more  CMS 2006»
15 years 5 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
ACSAC
1999
IEEE
15 years 8 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
ATAL
2008
Springer
15 years 6 months ago
Extending agent languages for autonomy
BDI agent languages provide a useful abstraction for complex systems comprised of interactive autonomous entities, but they have been used mostly in the context of single agents w...
Felipe Rech Meneguzzi