Sciweavers

518 search results - page 74 / 104
» Abstract Interpretation-Based Protection
Sort
View
IJCNN
2006
IEEE
15 years 8 months ago
Recurrent Neural Network Based Predictions of Elephant Migration in a South African Game Reserve
Abstract— A large portion of South Africa’s elephant population can be found on small wildlife reserves. When confined to enclosed reserves the elephant densities are much hig...
Parviz Palangpour, Ganesh K. Venayagamoorthy, Kevi...
WMTE
2006
IEEE
15 years 8 months ago
Handheld-Mediated Communication to Support the Effective Sharing of Meaning in Joint Activity
This paper reports the results of a laboratory study of a proposed solution to the problem of coordinating entry into collaborative activity while protecting the privacy and contr...
Kibum Kim, Deborah G. Tatar, Steve R. Harrison
NSPW
2006
ACM
15 years 8 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
COMPSAC
2005
IEEE
15 years 7 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
15 years 7 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind