Sciweavers

507 search results - page 77 / 102
» Normalization Theory for XML
Sort
View
142
Voted
ADHOCNETS
2009
Springer
15 years 10 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
HICSS
2007
IEEE
66views Biometrics» more  HICSS 2007»
15 years 10 months ago
Socio-Technological Systems Integration to Support Tsunami Warning and Evacuation
On December 26, 2004, countries in the Indian Ocean basin were struck by a tsunami generated by a large magnitude earthquake just south of the western tip of Sumatra. Observations...
Richard G. Little, William A. Wallace, Thomas A. B...
123
Voted
KBSE
2007
IEEE
15 years 10 months ago
The business case for automated software engineering
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
155
Voted
AAMAS
2007
Springer
15 years 10 months ago
Bifurcation Analysis of Reinforcement Learning Agents in the Selten's Horse Game
Abstract. The application of reinforcement learning algorithms to multiagent domains may cause complex non-convergent dynamics. The replicator dynamics, commonly used in evolutiona...
Alessandro Lazaric, Jose Enrique Munoz de Cote, Fa...
116
Voted
ESORICS
2007
Springer
15 years 10 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu