Sciweavers

1592 search results - page 82 / 319
» The state of the email address
Sort
View
SIGUCCS
2000
ACM
14 years 1 months ago
There is No Such Thing as Free Support
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
Dianne Brotherson
IICAI
2003
13 years 10 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
ECAI
2010
Springer
13 years 10 months ago
ANTIPA: an agent architecture for intelligent information assistance
Abstract. Human users trying to plan and accomplish informationdependent goals in highly dynamic environments with prevalent uncertainty must consult various types of information s...
Jean Oh, Felipe Meneguzzi, Katia P. Sycara
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ASE
2004
137views more  ASE 2004»
13 years 9 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...