Sciweavers

8377 search results - page 156 / 1676
» Scenarios - Introduction
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
ATAL
2006
Springer
15 years 8 months ago
MLBP: MAS for large-scale biometric pattern recognition
Abstract. Security systems can observe and hear almost anyone everywhere. However, it is impossible to employ an adequate number of human experts to analyze the information explosi...
Ram Meshulam, Shulamit Reches, Aner Yarden, Sarit ...
DSRT
2004
IEEE
15 years 8 months ago
HLA-Based Distributed Simulation Cloning
Distributed simulation cloning technology is designed to analyze alternative scenarios of a distributed simulation concurrently within the same execution session. The goal is to o...
Dan Chen, Stephen John Turner, Boon-Ping Gan, Went...
ECTEL
2006
Springer
15 years 8 months ago
From the Analysis of Community Activity to the Appropriation of New Tools. A Methodological Approach for the Development of Info
More and more CoPs have chosen virtual environments and services to support their activities. However, recent research has underlined several problems: the lack of adequate scaffol...
Bernadette Charlier, France Henri, Amaury Daele, M...
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
15 years 8 months ago
On-line evolutionary computation for reinforcement learning in stochastic domains
In reinforcement learning, an agent interacting with its environment strives to learn a policy that specifies, for each state it may encounter, what action to take. Evolutionary c...
Shimon Whiteson, Peter Stone