Sciweavers

5216 search results - page 945 / 1044
» Planning as Model Checking
Sort
View
AISM
2004
15 years 4 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
143
Voted
APVIS
2004
15 years 4 months ago
Semi-Automatic Feature Delineation In Medical Images
Resection or ablation of tumours is one treatment available for liver cancer. This delicate operation consists of removing the tumour(s) and surrounding healthy tissues. The surge...
Robin Martin, Nicole Bordes, Thomas Hugh, Bernard ...
105
Voted
CLIMA
2004
15 years 4 months ago
Learning in BDI Multi-agent Systems
Abstract. This paper deals with the issue of learning in multi-agent systems (MAS). Particularly, we are interested in BDI (Belief, Desire, Intention) agents. Despite the relevance...
Alejandro Guerra-Hernández, Amal El Fallah-...
127
Voted
IADIS
2004
15 years 4 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
APBC
2003
15 years 4 months ago
Towards Transparent Access to Multiple Biological Databanks
Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem i...
Patrick Lambrix, Vaida Jakoniene