Sciweavers

470 search results - page 58 / 94
» From evidence-based policy making to policy analytics
Sort
View
116
Voted
NDSS
2003
IEEE
15 years 5 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum
111
Voted
ICDCS
2002
IEEE
15 years 5 months ago
Bidding for Storage Space in a Peer-to-Peer Data Preservation System
Digital archives protect important data collections from failures by making multiple copies at other archives, so that there are always several good copies of a collection. In a c...
Brian F. Cooper, Hector Garcia-Molina
104
Voted
ATAL
2006
Springer
15 years 4 months ago
Learning trust strategies in reputation exchange networks
An agent's trust decision strategy consists of the agent's policies for making trust-related decisions, such as who to trust, how trustworthy to be, what reputations to ...
Karen Fullam, K. Suzanne Barber
144
Voted
MIE
2008
194views Healthcare» more  MIE 2008»
15 years 1 months ago
Developing a Shared Electronic Health Record for Patients and Clinicians
Improving Shared Decision Making (SDM) and patient-provider communication, and providing all citizens with equal access to health information has become a high priority health poli...
Cornelia M. Ruland, Haakon Bryhni, Roar Andersen, ...
117
Voted
AIPS
2009
15 years 1 months ago
Navigation Planning in Probabilistic Roadmaps with Uncertainty
Probabilistic Roadmaps (PRM) are a commonly used class of algorithms for robot navigation tasks where obstacles are present in the environment. We examine the situation where the ...
Michael Kneebone, Richard Dearden