Sciweavers

440 search results - page 79 / 88
» Organized Anonymity in Agent Systems
Sort
View
FOIS
2010
13 years 9 months ago
Ontologies for Distributed Command and Control Messaging
This paper presents the development of a set of ontologies for use in messaging systems within military and emergency first responder command and control applications. These ontolo...
Duc N. Nguyen, Joseph B. Kopena, Boon Thau Loo, Wi...
POLICY
2004
Springer
14 years 26 days ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ICML
1999
IEEE
13 years 11 months ago
Learning Hierarchical Performance Knowledge by Observation
Developing automated agents that intelligently perform complex real world tasks is time consuming and expensive. The most expensive part of developing these intelligent task perfo...
Michael van Lent, John E. Laird
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 24 days ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd