Sciweavers

1134 search results - page 182 / 227
» Towards a Theory of Information Systems: The FRISCO Approach
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 3 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ATAL
2010
Springer
13 years 10 months ago
Bootstrapping trust evaluations through stereotypes
In open, dynamic multi-agent systems, agents may form short-term ad-hoc groups, such as coalitions, in order to meet their goals. Trust and reputation are crucial concepts in thes...
Chris Burnett, Timothy J. Norman, Katia P. Sycara
ATAL
1997
Springer
14 years 28 days ago
Multi-Agent Coordination through Coalition Formation
Incorporating coalition formation algorithms into agent systems shall be advantageous due to the consequent increase in the overall quality of task performance. Coalition formatio...
Onn Shehory, Katia P. Sycara, Somesh Jha
CASES
2010
ACM
13 years 6 months ago
Real-time unobtrusive program execution trace compression using branch predictor events
Unobtrusive capturing of program execution traces in real-time is crucial in debugging cyber-physical systems. However, tracing even limited program segments is often cost-prohibi...
Vladimir Uzelac, Aleksandar Milenkovic, Martin Bur...
AAAI
2007
13 years 11 months ago
AURA: Enabling Subject Matter Experts to Construct Declarative Knowledge Bases from Science Textbooks
The long-term goal of Project Halo is to build an application called Digital Aristotle that can answer questions on a variety of science topics and provide user and domain appropr...
Ken Barker, Vinay K. Chaudhri, Shaw Yi Chaw, Peter...