Sciweavers

1777 search results - page 261 / 356
» Programming Cryptographic Protocols
Sort
View
DSOM
2003
Springer
14 years 2 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
IPPS
2000
IEEE
14 years 1 months ago
Reducing Ownership Overhead for Load-Store Sequences in Cache-Coherent Multiprocessors
Parallel programs that modify shared data in a cachecoherent multiprocessor with a write-invalidate coherence protocol create ownership overhead in the form of ownership acquisiti...
Jim Nilsson, Fredrik Dahlgren
ATAL
2006
Springer
14 years 16 days ago
Run-time model checking of interaction and deontic models for multi-agent systems
This paper is concerned with the problem of obtaining predictable interactions between groups of agents in open environments when individual agents do not expose their bdi logic. ...
Nardine Osman, David Robertson, Christopher Walton
JURIX
2008
13 years 10 months ago
Argument Based Moderation of Benefit Assessment
: Error rates in the assessment of routine claims for welfare benefits have been found to very high in Netherlands, USA and UK. This is a significant problem both in terms of quali...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
IQ
2000
13 years 10 months ago
Improving Information Quality in Loan Approval Processes for Fair Lending and Fair Pricing
: Current banking data management on loan approval processes has great room for improvements of information quality and prevention of data problems in general, but especially with ...
M. Cary Collins, Frank M. Guess