Sciweavers

6907 search results - page 190 / 1382
» Securing distributed adaptation
Sort
View
AGENTS
2001
Springer
15 years 7 months ago
ATTac-2000: an adaptive autonomous bidding agent
The First Trading Agent Competition TAC was held from June 22nd to July 8th, 2000. TAC was designed to create a benchmark problem in the complex domain of emarketplaces and to m...
Peter Stone, Michael L. Littman, Satinder P. Singh...
129
Voted
CCS
2009
ACM
15 years 10 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ECOOPW
2006
Springer
15 years 6 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
UIALL
2004
Springer
15 years 8 months ago
Adaptive User Modelling in AthosMail
In this paper we discuss the adaptive User Model component of the AthosMail system, and describe especially the Cooperativity Model which produces recommendations for the appropria...
Kristiina Jokinen, Kari Kanto, Jyrki Rissanen