Sciweavers

507 search results - page 77 / 102
» Normalization Theory for XML
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
HICSS
2007
IEEE
66views Biometrics» more  HICSS 2007»
14 years 2 months ago
Socio-Technological Systems Integration to Support Tsunami Warning and Evacuation
On December 26, 2004, countries in the Indian Ocean basin were struck by a tsunami generated by a large magnitude earthquake just south of the western tip of Sumatra. Observations...
Richard G. Little, William A. Wallace, Thomas A. B...
KBSE
2007
IEEE
14 years 2 months ago
The business case for automated software engineering
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
AAMAS
2007
Springer
14 years 1 months ago
Bifurcation Analysis of Reinforcement Learning Agents in the Selten's Horse Game
Abstract. The application of reinforcement learning algorithms to multiagent domains may cause complex non-convergent dynamics. The replicator dynamics, commonly used in evolutiona...
Alessandro Lazaric, Jose Enrique Munoz de Cote, Fa...
ESORICS
2007
Springer
14 years 1 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu