Sciweavers

143 search results - page 28 / 29
» Secure Intelligent Agents Based on Formal Description Techni...
Sort
View
TPHOL
2009
IEEE
14 years 27 days ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
IDEAL
2005
Springer
13 years 11 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
AAAI
2000
13 years 7 months ago
Nurse Rostering at the Hospital Authority of Hong Kong
This paper describes the Rostering Engine (RE) that we have developed for the Hospital Authority (HA), Hong Kong as part of their Staff Rostering System (SRS) using AI constraint-...
Andy Hon Wai Chun, Steve Ho Chuen Chan, Garbbie Pu...
ATAL
2009
Springer
14 years 25 days ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
AAAI
2006
13 years 7 months ago
Model Counting: A New Strategy for Obtaining Good Bounds
Model counting is the classical problem of computing the number of solutions of a given propositional formula. It vastly generalizes the NP-complete problem of propositional satis...
Carla P. Gomes, Ashish Sabharwal, Bart Selman