Sciweavers

420 search results - page 76 / 84
» Reasoning about Evolving Nonmonotonic Knowledge Bases
Sort
View
NSPW
2004
ACM
14 years 27 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
VLDB
2004
ACM
124views Database» more  VLDB 2004»
14 years 25 days ago
Containment of Nested XML Queries
Query containment is the most fundamental relationship between a pair of database queries: a query Q is said to be contained in a query Q if the answer for Q is always a subset of...
Xin Dong, Alon Y. Halevy, Igor Tatarinov
CHI
2000
ACM
13 years 12 months ago
Evaluation of eye gaze interaction
Eye gaze interaction can provide a convenient and natural addition to user-computer dialogues. We have previously reported on our interaction techniques using eye gaze [10]. While...
Linda E. Sibert, Robert J. K. Jacob
ECAI
2004
Springer
13 years 11 months ago
Configuration of Web Services as Parametric Design
Abstract. The configuration of Web services is particularly hard given the heterogeneous, unreliable and open nature of the Web. Furthermore, such composite Web services are likely...
Annette ten Teije, Frank van Harmelen, Bob J. Wiel...
ICAI
2003
13 years 8 months ago
Collaborative Agents for C2 Teamwork Simulation
– Existing team training software often requires that trainees be organized as physical teams and the members of the same team be trained at the same time. To demonstrate that te...
Dianxiang Xu, Michael S. Miller, Richard A. Volz, ...