Sciweavers

1243 search results - page 205 / 249
» More efficient predictive control
Sort
View
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
138
Voted
IFIP
2003
Springer
15 years 9 months ago
Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets
Efficient communication in Bluetooth scatternets requires design of intra and inter-piconet scheduling algorithms, and therefore numerous algorithms have been proposed. However, du...
Gil Zussman, Uri Yechiali, Adrian Segall
HAIS
2010
Springer
15 years 8 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
MDM
2001
Springer
15 years 8 months ago
Quasi-consistency and Caching with Broadcast Disks
The challenges ensuing from the asymmetric communication capabilities of mobile environments have led to an increased interest in broadcast-based data dissemination. Among the conc...
Rashmi Srinivasa, Sang Hyuk Son
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 8 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara