Sciweavers

4998 search results - page 5 / 1000
» The case for intentional networking
Sort
View
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 8 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
EDOC
2006
IEEE
14 years 2 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
ICSM
2003
IEEE
14 years 1 months ago
Using Intentional Source-Code Views to Aid Software Maintenance
The conceptual structure of existing software systems is often implicit or non-existing in the source code. We prolightweight abstraction of intentional source-code views as a mea...
Kim Mens, Bernard Poll, Sebastián Gonz&aacu...
E4MAS
2006
Springer
14 years 8 days ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers
KI
2010
Springer
13 years 6 months ago
Situation-Specific Intention Recognition for Human-Robot Cooperation
Recognizing human intentions is part of the decision process in many technical devices. In order to achieve natural interaction, the required estimation quality and the used comput...
Peter Krauthausen, Uwe D. Hanebeck