Sciweavers

517 search results - page 41 / 104
» On the Intended Interpretations of Actions
Sort
View
72
Voted
CORR
2010
Springer
106views Education» more  CORR 2010»
14 years 9 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
PERCOM
2007
ACM
15 years 10 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
15 years 5 months ago
GrayWulf: Scalable Software Architecture for Data Intensive Computing
Big data presents new challenges to both cluster infrastructure software and parallel application design. We present a set of software services and design principles for data inte...
Yogesh Simmhan, Roger S. Barga, Catharine van Inge...
89
Voted
EPIA
2009
Springer
15 years 5 months ago
Intention Recognition via Causal Bayes Networks Plus Plan Generation
Abstract. In this paper, we describe a novel approach to tackle intention recognition, by combining dynamically configurable and situation-sensitive Causal Bayes Networks plus pla...
Luís Moniz Pereira, Han The Anh
ISI
2007
Springer
15 years 5 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...