Sciweavers

531 search results - page 66 / 107
» An Approach to Rapid Prototyping of Large Multi-Agent System...
Sort
View
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
A Pilot Study of CZTalk: A Graphical Tool for Collaborative Knowledge Work
Research in face-to-face communication has identified a variety of largely unconscious patterns of behavior that are used by collaborators to coordinate their conversation, build ...
Heidi Lam, Brian D. Fisher, John Dill
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 9 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
NOMS
2008
IEEE
14 years 3 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
14 years 2 months ago
A Scalable Collaborative Filtering Framework Based on Co-Clustering
Collaborative filtering-based recommender systems, which automatically predict preferred products of a user using known preferences of other users, have become extremely popular ...
Thomas George, Srujana Merugu
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 3 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...