Sciweavers

629 search results - page 102 / 126
» Reasoning About Knowledge of Unawareness
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ECAI
2004
Springer
14 years 1 months ago
A Formal Tutoring Process Model for Intelligent Tutoring Systems
The combination Computer Based Training systems with Artificial Intelligence and Cognitive Science has led to the development of Intelligent Tutoring Systems nearly 30 years ago. ...
Alke Martens, Adelinde Uhrmacher
VLDB
2004
ACM
124views Database» more  VLDB 2004»
14 years 1 months ago
Containment of Nested XML Queries
Query containment is the most fundamental relationship between a pair of database queries: a query Q is said to be contained in a query Q if the answer for Q is always a subset of...
Xin Dong, Alon Y. Halevy, Igor Tatarinov
ICRA
2002
IEEE
75views Robotics» more  ICRA 2002»
14 years 18 days ago
First Experiment in Sun-Synchronous Exploration
Sun-synchronous exploration is accomplished by reasoning about sunlight: where the Sun is in the sky, where and when shadows will fall, and how much power can be obtained through ...
David Wettergreen, M. Bernardine Dias, Benjamin Sh...
ECRTS
1999
IEEE
13 years 12 months ago
Handling sporadic tasks in off-line scheduled distributed real-time systems
Many industrial applications mandate the use of a timetriggered paradigm and consequently the use of off-line scheduling for reasons such as predictability, certification, cost, o...
Damir Isovic, Gerhard Fohler