Sciweavers

1512 search results - page 91 / 303
» When Suboptimal Rules
Sort
View
JFR
2006
141views more  JFR 2006»
13 years 10 months ago
A method for protocol-based collision avoidance between autonomous marine surface craft
This paper is concerned with the in-field autonomous operation of unmanned marine vehicles in accordance with convention for safe and proper collision avoidance as prescribed by t...
Michael R. Benjamin, John J. Leonard, Joseph A. Cu...
IGPL
1998
97views more  IGPL 1998»
13 years 9 months ago
Towards Structurally-Free Theorem Proving
Is it possible to compute in which logics a given formula is deducible? The aim of this paper is to provide a formal basis to answer positively this question in the context of sub...
Marcelo Finger
TPLP
2010
115views more  TPLP 2010»
13 years 8 months ago
Towards closed world reasoning in dynamic open worlds
The need for integration of ontologies with nonmonotonic rules has been gaining importance in a number of areas, such as the Semantic Web. A number of researchers addressed this p...
Martin Slota, João Leite
CHI
2011
ACM
13 years 1 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
14 years 4 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...