Sciweavers

3373 search results - page 160 / 675
» Naturalistic Decision Making
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
HICSS
2000
IEEE
115views Biometrics» more  HICSS 2000»
14 years 23 days ago
Utility Information Integration - Vision, Benefits, Strategies, and Status
: Successfully incorporating utility engineering functions into business decisions requires integrating the numeric-intensive world of the engineer with business systems that are d...
S. F. Mauser, J. Gillerman, D. Nordell
CLIMA
2007
13 years 10 months ago
Fuzzy Argumentation for Trust
In an open Multi-Agent System, the goals of agents acting on behalf of their owners often conflict with each other. Therefore, a personal agent protecting the interest of a single...
Ruben Stranders, Mathijs de Weerdt, Cees Witteveen
VAMOS
2010
Springer
13 years 10 months ago
Supporting Stepwise, Incremental Product Derivation in Product Line Requirements Engineering
Deriving products from a software product line is difficult, particularly when there are many constraints in the variability of the product line. Understanding the impact of variab...
Reinhard Stoiber, Martin Glinz
WEBIST
2008
13 years 10 months ago
A Process Mining Approach to Analyse User Behaviour
Abstract. Designing and personalising systems for specific user groups encompasses a lot of effort with respect to analysing and understanding user behaviour. The goal of our paper...
Laura Maruster, Niels R. Faber, René J. Jor...