Sciweavers

4702 search results - page 156 / 941
» How to Copyright a Function
Sort
View
CCS
2006
ACM
15 years 8 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ICIA
2007
15 years 6 months ago
Learning Interaction between Conflicting Human Agents and Their Assistants
We build the generic methodology based on machine learning and reasoning to detect the patterns of interaction between conflicting agents, including humans and their assistants. L...
Boris Galitsky, Boris Kovalerchuk
IAAI
2003
15 years 5 months ago
Guided Conversations about Leadership: Mentoring with Movies and Interactive Characters
Think Like a Commander – Excellence in Leadership (TLAC-XL) is an application designed for learning leadership skills both from the experiences of others and through a structure...
Randall W. Hill Jr., Jay Douglas, Andrew Gordon, F...
SCS
2004
15 years 5 months ago
The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation
The HEAT/ACT project consists of replacing the conventional mechanical flight control system of a helicopter with a fly-by-wire system. With such a project, the safety concerns ar...
Paul Chinneck, David Pumfrey, John McDermid
DOCENG
2010
ACM
15 years 5 months ago
Document imaging security and forensics ecosystem considerations
: Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-2010-156 Security, Forensics, Colo...
Steven J. Simske, Margaret Sturgill, Guy Adams, Pa...