Sciweavers

334 search results - page 18 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 1 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
CCS
2001
ACM
14 years 11 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CSL
2011
Springer
13 years 2 months ago
Designing and evaluating a wizarded uncertainty-adaptive spoken dialogue tutoring system
We describe the design and evaluation of two different dynamic student uncertainty adaptations in wizarded versions of a spoken dialogue tutoring system. The two adaptive systems...
Katherine Forbes-Riley, Diane J. Litman
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
COLING
2010
13 years 2 months ago
Filtered Ranking for Bootstrapping in Event Extraction
Several researchers have proposed semi-supervised learning methods for adapting event extraction systems to new event types. This paper investigates two kinds of bootstrapping met...
Shasha Liao, Ralph Grishman