Sciweavers

2979 search results - page 389 / 596
» Modelling secure multiagent systems
Sort
View
JCS
2002
103views more  JCS 2002»
15 years 4 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
ITP
2010
164views Mathematics» more  ITP 2010»
15 years 8 months ago
Nitpick: A Counterexample Generator for Higher-Order Logic Based on a Relational Model Finder
Nitpick is a counterexample generator for Isabelle/HOL that builds on Kodkod, a SAT-based first-order relational model finder. Nitpick supports unbounded quantification, (co)ind...
Jasmin Christian Blanchette, Tobias Nipkow
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
15 years 10 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain
WETICE
2007
IEEE
15 years 10 months ago
Coordinating Knowledge in Pervasive Environments
A new application of tuple-space-based coordination systems is in knowledge communication and representation. This knowledge is being published on the Web (the so-called “Semant...
Lyndon J. B. Nixon, Robert Tolksdorf, Alan Wood, R...
AOSE
2005
Springer
15 years 9 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...