Sciweavers

1348 search results - page 20 / 270
» Keynote Address I
Sort
View
RAID
2004
Springer
15 years 3 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
ICMAS
2000
14 years 11 months ago
CCL: Expressions of Choice in Agent Communication
When shall I fly to New York? Which airline should I choose? How are these related to which airport I arrive at, to how I might travel into the city and to where I choose to stay?...
Steven Willmott, Monique Calisti, Boi Faltings, Sa...
AIPS
1996
14 years 11 months ago
Event-Based Decompositions for Reasoning about External Change in Planners
An increasing number of planners can handle uncertainty in the domain or in action outcomes. However, less work has addressed building plans when the planner's world can chan...
Jim Blythe
WWW
2006
ACM
15 years 10 months ago
Live URLs: breathing life into URLs
This paper provides a novel approach to use URI fragment identifiers to enable HTTP clients to address and process content, independent of its original representation. Categories ...
Natarajan Kannan, Toufeeq Hussain
77
Voted
ACMIDC
2008
14 years 11 months ago
Supporting parent-child interaction in divorced families
Divorce affects a significant number of children and parents. In this work, I discuss the challenges that these families may face and present two systems that may help address som...
Svetlana Yarosh