Sciweavers

4413 search results - page 747 / 883
» Security for biometric data
Sort
View
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 3 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
CORR
2000
Springer
138views Education» more  CORR 2000»
15 years 3 months ago
Towards rule-based visual programming of generic visual systems
This paper illustrates how the diagram programming language DIAPLAN can be used to program visual systems. DIAPLAN is a visual rulebased language that is founded on the computation...
Berthold Hoffmann, Mark Minas
CSCW
2002
ACM
15 years 3 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
148
Voted
SAC
2002
ACM
15 years 3 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
121
Voted
SIAMCOMP
2002
95views more  SIAMCOMP 2002»
15 years 3 months ago
A Linear Algorithm for Finding the Invariant Edges of an Edge-Weighted Graph
Given an edge-weighted graph where all weights are nonnegative reals, an edge reweighting is an assignment of nonnegative reals to edges such that, for each vertex, the sums of giv...
Francesco M. Malvestuto, Mauro Mezzini