Sciweavers

5634 search results - page 277 / 1127
» About Abstract Classes
Sort
View
WISTP
2007
Springer
15 years 11 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 11 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
168
Voted
IAT
2006
IEEE
15 years 11 months ago
Goal-Oriented Development of BDI Agents: The PRACTIONIST Approach
The representation of goals and the ability to reason about them play an important role in goal-oriented requirements analysis and modelling techniques, especially in agent-orient...
Vito Morreale, Susanna Bonura, Giuseppe Francavigl...
IJCNN
2006
IEEE
15 years 11 months ago
Predictive Random Graph Ranking on the Web
Abstract— The incomplete information about the Web structure causes inaccurate results of various ranking algorithms. In this paper, we propose a solution to this problem by form...
Haixuan Yang, Irwin King, Michael R. Lyu
CEEMAS
2005
Springer
15 years 10 months ago
Modelling of Agents' Behavior with Semi-collaborative Meta-agents
Abstract. An autonomous agent may largely benefit from its ability to reconstruct another agent’s reasoning principles from records of past events and general knowledge about th...
Jan Tozicka, Filip Zelezný, Michal Pechouce...