Sciweavers

158 search results - page 11 / 32
» Information Leakage Detection in Distributed Systems using S...
Sort
View
IUI
2000
ACM
15 years 4 months ago
User interactions with everyday applications as context for just-in-time information access
Our central claim is that user interactions with everyday productivity applications (e.g., word processors, Web browsers, etc.) provide rich contextual information that can be lev...
Jay Budzik, Kristian J. Hammond
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 4 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
ICMAS
2000
15 years 1 months ago
The Adaptive Agent Architecture: Achieving Fault-Tolerance Using Persistent Broker Teams
Brokers are used in many multi-agent systems for locating agents, for routing and sharing information, for managing the system, and for legal purposes, as independent third partie...
Sanjeev Kumar, Philip R. Cohen, Hector J. Levesque
IBERAMIA
2004
Springer
15 years 5 months ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 4 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba