Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Intrusion Detection has become an essential component of security mechanisms for information systems. Traditional Intrusion Detection Systems generally apply a single detection model and data source. Thus, they tend to suffer from large...
In this dissertation we design a system that allows Semantic Web agents to reason within what has come to be known as the Web of Trust. We integrated reasoning about belief and trust, so agents can reason about information from different...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
Selection of a suitable Ph.D. supervisor is a very important step in a student's career. This dissertation presents a multi-criteria decision support system to assist students in making this choice. The system employs a hybrid method...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.