Sciweavers

176 search results - page 30 / 36
» Constraint solvers: An empirical evaluation of design decisi...
Sort
View
ACSAC
2003
IEEE
15 years 2 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
AGENTS
2001
Springer
15 years 2 months ago
Principles of intention reconsideration
We present a framework that enables a belief-desire-intention (BDI) agent to dynamically choose its intention reconsideration policy in order to perform optimally in accordance wi...
Martijn C. Schut, Michael Wooldridge
DSN
2007
IEEE
15 years 4 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
SAC
2008
ACM
14 years 9 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
BCSHCI
1997
14 years 11 months ago
BUILD-IT: A Computer Vision-based Interaction Technique for a Planning Tool
In this article we wish to show a method to go beyond the established approaches of human-computer interaction. We first bring a serious critique of traditional interface types, sh...
Matthias Rauterberg, Morten Fjeld, Helmut Krueger,...