Sciweavers

55 search results - page 9 / 11
» The Design, Deployment and Evaluation of the AnimalWatch Int...
Sort
View
FLAIRS
2007
13 years 8 months ago
System Diagnosability Analysis Using p-slop MAP
Researchers have reported successful deployments of diagnosis decision support systems based on Bayesian networks. However, the methodology for evaluating the diagnosability for s...
Tsai-Ching Lu, K. Wojtek Przytula
CSCW
2000
ACM
13 years 10 months ago
MUSICFX: an arbiter of group preferences for computer supported collaborative workouts
Environmental factors affecting shared spaces are typically designed to appeal to the broadest audiences they are expected to serve, ignoring the preferences of the people actuall...
Joseph F. McCarthy, Theodore D. Anagnost
ATAL
2011
Springer
12 years 6 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
IAT
2007
IEEE
14 years 23 days ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 8 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...