Sciweavers

412 search results - page 46 / 83
» An evaluation of timed scenario notations
Sort
View
ESORICS
2004
Springer
14 years 4 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
MSWIM
2006
ACM
14 years 5 months ago
Location-based admission control for differentiated services in 3G cellular networks
Third generation wireless systems can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As resources are limited (particularly in the...
Rudesindo Núñez-Queija, Hwee Pink Ta...
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
14 years 4 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz
ARGMAS
2004
Springer
14 years 4 months ago
Is It Worth Arguing?
Argumentation-based negotiation (ABN) is an effective means of resolving conflicts in a multi-agent society. However, it consumes both time and computational resources for agents ...
Nishan C. Karunatillake, Nicholas R. Jennings
SDMW
2004
Springer
14 years 4 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...