Sciweavers

470 search results - page 89 / 94
» An adaptive probabilistic trust model and its evaluation
Sort
View
WIAS
2010
152views more  WIAS 2010»
13 years 7 months ago
Towards a systematic approach for designing autonomic systems
An autonomic system is a system capable of managing itself and adjusting its actions in the face of environmental changes. Autonomic systems are currently developed using ad-hoc ap...
Walamitien H. Oyenan, Scott A. DeLoach
CHI
2011
ACM
13 years 11 days ago
OldGen: mobile phone personalization for older adults
Mobile devices are currently difficult to customize for the usability needs of elderly users. The elderly are instead referred to specially designed “senior phones” or softwar...
Alex Olwal, Dimitris Lachanas, Ermioni Zacharouli
AAAI
2012
11 years 11 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 2 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
CIKM
2010
Springer
13 years 7 months ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee