Sciweavers

117 search results - page 17 / 24
» An Empirical Analysis of C Preprocessor Use
Sort
View
CCS
2008
ACM
13 years 10 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
IJIT
2004
13 years 10 months ago
Computing Entropy for Ortholog Detection
Abstract-- Biological sequences from different species are called orthologs if they evolved from a sequence of a common ancestor species and they have the same biological function....
Hsing-Kuo Pao, John Case
CCS
2011
ACM
12 years 8 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
IWC
2007
106views more  IWC 2007»
13 years 8 months ago
The role of social presence in establishing loyalty in e-Service environments
Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally dev...
Dianne Cyr, Khaled Hassanein, Milena M. Head, Alex...
ARGMAS
2004
Springer
14 years 2 months ago
Is It Worth Arguing?
Argumentation-based negotiation (ABN) is an effective means of resolving conflicts in a multi-agent society. However, it consumes both time and computational resources for agents ...
Nishan C. Karunatillake, Nicholas R. Jennings