Sciweavers

405 search results - page 50 / 81
» Avatar-centric Risk Evaluation
Sort
View
ACG
2003
Springer
15 years 3 months ago
Opponent-Model Search in Bao: Conditions for a Successful Application
Abstract Opponent-Model search is a game-tree search method that explicitly uses knowledge of the opponent. There is some risk involved in using Opponent-Model search. Both the pre...
H. H. L. M. Donkers, H. Jaap van den Herik, Jos W....
COMPSAC
2009
IEEE
15 years 2 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
ICSE
2000
IEEE-ACM
15 years 1 months ago
Multiple mass-market applications as components
Truly successful models for component-based software development continue to prove elusive. One of the few is the use of operating system, database and similar programs in many sy...
David Coppit, Kevin J. Sullivan
WSC
1997
14 years 11 months ago
Object-Oriented Simulation of Paratrooper-Vortex Interactions
The C-17 Airdrop Model provides the Air Force and Army test and evaluation community with the capability to (i) assess the risk of vortex encounters, and (ii) predict ground dispe...
T. Glenn Bailey, Jose C. Belano III, Philip S. Ber...
CSREASAM
2009
14 years 10 months ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki