Sciweavers

4595 search results - page 784 / 919
» Reasoning about Plans
Sort
View
CIB
2002
100views more  CIB 2002»
13 years 8 months ago
Web-log Mining for Quantitative Temporal-Event Prediction
The web log data embed much of web users' browsing behavior. From the web logs, one can discover patterns that predict the users' future requests based on their current b...
Qiang Yang, Hui Wang, Wei Zhang
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 8 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 8 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ETS
2000
IEEE
182views Hardware» more  ETS 2000»
13 years 8 months ago
Conferencing in communities of learners: examples from social history and science communication
A commonly encountered view of computer conferencing focuses on peer interaction, student empowerment and a shift in both teacher and student roles. This paper argues that this vi...
Ann C. Jones, Eileen Scanlon, Canan Tosunoglu Blak...
ENTCS
2002
108views more  ENTCS 2002»
13 years 8 months ago
Bisimulation Relations for Dynamical and Control Systems
In this paper we propose a new equivalence relation for dynamical and control systems called bisimulation. As the name implies this definition is inspired by the fundamental notio...
Esfandiar Haghverdi, Paulo Tabuada, George J. Papp...