180
click to vote
CIA
15 years 6 months ago
2008 Springer
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
130
click to vote
CIA
15 years 6 months ago
2008 Springer
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
146
click to vote
CIA
15 years 6 months ago
2008 Springer
This paper presents the design of an open architecture for heterogeneous negotiating agents. Both the system level architecture as well as the architecture for negotiating agents a...
121
click to vote
CIA
15 years 5 months ago
2008 Springer
Abstract. The rapid advances in the computer industry allow building larger systems that require mass storage volumes. As storage space increases, its management becomes increasing...
138
click to vote
CIA
15 years 6 months ago
2008 Springer
In order for personal assistant agents in an ambient intelligence context to provide good recommendations, or pro-actively support humans in task allocation, a good model of what t...
|