Sciweavers

981 search results - page 127 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CORR
2011
Springer
217views Education» more  CORR 2011»
14 years 5 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins
IBMRD
2011
112views more  IBMRD 2011»
14 years 8 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
EEE
2005
IEEE
15 years 7 months ago
DR-BROKERING - A Defeasible Logic-Based System for Semantic Brokering
Electronic Brokering, is a good candidate for taking up Semantic Web technology. In this paper we study the brokering and matchmaking problem that is, how a requester’s requirem...
Grigoris Antoniou, Thomas Skylogiannis, Antonis Bi...
ICETE
2004
204views Business» more  ICETE 2004»
15 years 2 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CCS
2010
ACM
15 years 14 days ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov