Sciweavers

359 search results - page 11 / 72
» Detecting Indirect Coupling
Sort
View
93
Voted
IEEEIA
2009
14 years 7 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
HOLOMAS
2007
Springer
15 years 3 months ago
Detecting Intrusions in Agent System by Means of Exception Handling
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Securityrelated exceptions are identifie...
Eric Platon, Martin Rehák, Nicolas Sabouret...
PAKDD
2007
ACM
224views Data Mining» more  PAKDD 2007»
15 years 3 months ago
Graph Nodes Clustering Based on the Commute-Time Kernel
This work presents a kernel method for clustering the nodes of a weighted, undirected, graph. The algorithm is based on a two-step procedure. First, the sigmoid commute-time kernel...
Luh Yen, François Fouss, Christine Decaeste...
ECAL
2003
Springer
15 years 2 months ago
Multi-agent Model of Biological Swarming
An agent-based approach is used to explain the formation of vortex swarms in biological systems. The dynamics of the multiagent system is described by 3N coupled equations, modeli...
Robert Mach, Frank Schweitzer
106
Voted
VL
2007
IEEE
134views Visual Languages» more  VL 2007»
15 years 3 months ago
A Comprehensive Evaluation of Workspace Awareness in Software Configuration Management Systems
Workspace awareness has emerged as a new coordination paradigm in software configuration management systems, enabling the early detection of potential conflicts by providing devel...
Anita Sarma, André van der Hoek, David F. R...