Sciweavers

1995 search results - page 120 / 399
» What's the Problem
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 9 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
CSEE
2001
Springer
15 years 8 months ago
Systems Failures
Software Systems permeate just about every aspect of life throughout developed and industrialised nations today. When failures arise, the aftermath is highly complicated because t...
John Donaldson, John Jenkins
CL
2000
Springer
15 years 8 months ago
Logic, Knowledge Representation, and Bayesian Decision Theory
In this paper I give a brief overview of recent work on uncertainty inAI, and relate it to logical representations. Bayesian decision theory and logic are both normative frameworks...
David Poole
ECAIW
1994
Springer
15 years 8 months ago
Agent Theories, Architectures, and Languages: A Survey
The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to poin...
Michael Wooldridge, Nicholas R. Jennings
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie