Sciweavers

1407 search results - page 181 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2007
IEEE
66views Biometrics» more  HICSS 2007»
15 years 10 months ago
Socio-Technological Systems Integration to Support Tsunami Warning and Evacuation
On December 26, 2004, countries in the Indian Ocean basin were struck by a tsunami generated by a large magnitude earthquake just south of the western tip of Sumatra. Observations...
Richard G. Little, William A. Wallace, Thomas A. B...
ATAL
2003
Springer
15 years 8 months ago
Agent memory and adaptation in multi-agent systems
We describe a general mechanism for adaptation in multiagent systems in which agents modify their behavior based on their memory of past events. These behavior changes can be elic...
Kristina Lerman, Aram Galstyan
DSS
2007
86views more  DSS 2007»
15 years 4 months ago
Efficiency of critical incident management systems: Instrument development and validation
There is much literature in the area of emergency response management systems. Even so, there is in general a lacuna of literature that deals with the issue of measuring the effec...
Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J....
SACMAT
2005
ACM
15 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGCSE
2008
ACM
166views Education» more  SIGCSE 2008»
15 years 4 months ago
Defense against the dark arts
Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These effort...
Mark W. Bailey, Clark L. Coleman, Jack W. Davidson