Sciweavers

1075 search results - page 87 / 215
» Using Activity Theory to Model Context Awareness
Sort
View
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
FUIN
2008
108views more  FUIN 2008»
15 years 2 months ago
Learning Ground CP-Logic Theories by Leveraging Bayesian Network Learning Techniques
Causal relations are present in many application domains. Causal Probabilistic Logic (CP-logic) is a probabilistic modeling language that is especially designed to express such rel...
Wannes Meert, Jan Struyf, Hendrik Blockeel
ECCV
2002
Springer
16 years 6 months ago
Visual Data Fusion for Objects Localization by Active Vision
Visual sensors provide exclusively uncertain and partial knowledge of a scene. In this article, we present a suitable scene knowledge representation that makes integration and fusi...
François Chaumette, Grégory Flandin
134
Voted
DOA
2001
117views more  DOA 2001»
15 years 5 months ago
Developing Mobile Agent Organizations: A Case Study in Digital Tourism
Mobile agents are a useful paradigm for the development of complex Internet applications. However, the effective development of mobile agent applications requires suitable models ...
Franco Zambonelli, Giacomo Cabri, Letizia Leonardi
EDOC
2011
IEEE
14 years 4 months ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...