Sciweavers

200 search results - page 32 / 40
» Hybrid intelligent systems for network security
Sort
View
ATAL
2009
Springer
15 years 6 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
IDTRUST
2009
ACM
15 years 6 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
IAT
2010
IEEE
14 years 9 months ago
A Biologically-Inspired Cognitive Agent Model Integrating Declarative Knowledge and Reinforcement Learning
Abstract--The paper proposes a biologically-inspired cognitive agent model, known as FALCON-X, based on an integration of the Adaptive Control of Thought (ACT-R) architecture and a...
Ah-Hwee Tan, Gee Wah Ng
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 10 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
IJCNN
2008
IEEE
15 years 6 months ago
A pragmatic path toward endowing virtually-embodied AIs with human-level linguistic capability
— Current work is described wherein simplified versions of the Novamente Cognition Engine (NCE) are being used to control virtual agents in virtual worlds such as game engines an...
Ben Goertzel