Sciweavers

2549 search results - page 347 / 510
» Toward a complexity theory of information systems developmen...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
ENTCS
2007
103views more  ENTCS 2007»
13 years 8 months ago
Policy-based Coordination in PAGODA: A Case Study
PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environme...
Carolyn L. Talcott
TSMC
2008
168views more  TSMC 2008»
13 years 7 months ago
Wise-ShopFloor: An Integrated Approach for Web-Based Collaborative Manufacturing
This paper presents an integrated approach for Web-based collaborative manufacturing, including distributed process planning, dynamic scheduling, real-time monitoring, and remote c...
Lihui Wang
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen