Sciweavers

2686 search results - page 372 / 538
» Parallel object monitors
Sort
View
DSN
2006
IEEE
15 years 7 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
122
Voted
EWCBR
2006
Springer
15 years 7 months ago
Supplementing Case-based Recommenders with Context Data
Abstract. We propose that traditional case-based recommender systems can be improved by informing them with context data describing the user's environment. We outline existing...
Lorcan Coyle, Evelyn Balfe, Graeme Stevenson, Stev...
133
Voted
APWEB
2003
Springer
15 years 7 months ago
A Web User Profiling Approach
People display regularities in almost everything they do. This paper proposes characteristics of an idealized algorithm that would allow an automatic extraction of web user profil ...
Younes Hafri, Chabane Djeraba, Peter L. Stanchev, ...
ECWEB
2000
Springer
128views ECommerce» more  ECWEB 2000»
15 years 7 months ago
Dynamic-Agents, Workflow and XML for E-Commerce Automation
Agent technologies are now being considered for automating tasks in e-commerce applications. However, conventional software agents with predefined functions, but without the abilit...
Qiming Chen, Umeshwar Dayal, Meichun Hsu, Martin L...
MA
2000
Springer
114views Communications» more  MA 2000»
15 years 7 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman