Sciweavers

1283 search results - page 200 / 257
» Science: the rules of the game
Sort
View
KSEM
2009
Springer
15 years 8 months ago
On Optimization of Predictions in Ontology-Driven Situation Awareness
Systems supporting situation awareness in large-scale control systems, such as, e. g., encountered in the domain of road traffic management, pursue the vision of allowing human ope...
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...
129
Voted
SPIN
2009
Springer
15 years 8 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ACMSE
2009
ACM
15 years 8 months ago
FI-based file access predictor
An algorithm is proposed for the purpose of optimizing the availability of files to an operating system prior to their being required during execution by a running system. This al...
Jinsuk Baek, Paul S. Fisher, Mingyung Kwak
ACSC
2008
IEEE
15 years 8 months ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele
ENC
2008
IEEE
15 years 8 months ago
Context-Aware Generation of User Interface Containers for Mobile Devices
—The world of the mobile devices involves restrictive features. Multiple efforts have been done to define the User Interface. Here, it is combined a neutral description of the UI...
Francisco J. Martínez-Ruiz, Jean Vanderdonc...