Sciweavers

AGENTS
2001
Springer
14 years 3 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen
AGENTS
2001
Springer
14 years 3 months ago
A formal framework for inter-agent dialogues
Peter McBurney, Simon Parsons
AGENTS
2001
Springer
14 years 3 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...
AGENTS
2001
Springer
14 years 3 months ago
Wasp nests for self-configurable factories
Agent-based approaches to manufacturing scheduling and control have gained increasing attention in recent years. Such approaches are attractive because they o er increased robustn...
Vincent A. Cicirello, Stephen F. Smith
AGENTS
2001
Springer
14 years 3 months ago
Hierarchical agent control: a framework for defining agent behavior
Marc S. Atkin, Gary W. King, David L. Westbrook, B...
ACSAC
2003
IEEE
14 years 3 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
ACSAC
2003
IEEE
14 years 3 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
ACSAC
2003
IEEE
14 years 3 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
ACSAC
2003
IEEE
14 years 3 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...