Sciweavers

3451 search results - page 447 / 691
» Collaborative attack modeling
Sort
View
121
Voted
CLIMA
2010
15 years 1 months ago
Speculative Abductive Reasoning for Hierarchical Agent Systems
Answer sharing is a key element in multi-agent systems as it allows agents to collaborate towards achieving a global goal. However exogenous knowledge of the world can influence e...
Jiefei Ma, Krysia Broda, Randy Goebel, Hiroshi Hos...
117
Voted
ISEM
2010
105views more  ISEM 2010»
15 years 1 months ago
A roadmap to adopting emerging technology in e-business: an empirical study
This study explores the firm’s readiness for developing emerging technology in e−business. By proposing a framework that captures technological, financial, and human capabilit...
Hsin-Lu Chang
117
Voted
ATAL
2009
Springer
15 years 12 days ago
Learning to Locate Trading Partners in Agent Networks
This paper is motivated by some recent, intriguing research results involving agent-organized networks (AONs). In AONs, nodes represent agents, and collaboration between nodes are...
John Porter, Kuheli Chakraborty, Sandip Sen
132
Voted
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
15 years 11 days ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 7 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...