In this paper we develop a novel probabilistic model of computational trust that allows agents to exchange and combine reputation reports over heterogeneous, correlated multi-dime...
Steven Reece, Stephen Roberts, Alex Rogers, Nichol...
Recognizing team actions in the behavior of embodied agents has many practical applications and had seen significant progress in recent years. One approach with proven results is ...
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Background: When proteins are subjected to proteolytic digestion and analyzed by mass spectrometry using a method such as 2D LC MS/MS, only a portion of the proteotypic peptides a...
William S. Sanders, Susan M. Bridges, Fiona M. McC...