Sciweavers

1573 search results - page 245 / 315
» Signs and Formal Concepts
Sort
View
SAC
2004
ACM
14 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ACISP
2004
Springer
14 years 3 months ago
Convertible Nominative Signatures
Abstract. A feasible solution to prevent potential misuse of signatures is to put some restrictions on their verification. Therefore S.J.Kim, S.J.Park and D.H.Won introduced the n...
Zhenjie Huang, Yumin Wang
AUSAI
2004
Springer
14 years 3 months ago
BayesTH-MCRDR Algorithm for Automatic Classification of Web Document
Nowadays, automated Web document classification is considered as an important method to manage and process an enormous amount of Web documents in digital forms that are extensive a...
Woo-Chul Cho, Debbie Richards
CAISE
2004
Springer
14 years 3 months ago
Goal-Driven Analysis of Process Model Validity
Business process modeling and design, which has attracted much attention in recent years, emphasizes mainly graphical representation, usually without an underlying theory. The lack...
Pnina Soffer, Yair Wand
CIA
2004
Springer
14 years 3 months ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos