Sciweavers

298 search results - page 10 / 60
» Applying Theory Revision to the Design of Distributed Databa...
Sort
View
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
EKAW
1999
Springer
13 years 11 months ago
Acquiring Expert Knowledge for the Design of Conceptual Information Systems
Abstract. Conceptual Information Systems unfold the conceptual structure of data stored in relational databases. In the design phase of the system, conceptual hierarchies have to b...
Gerd Stumme
CHI
2008
ACM
14 years 7 months ago
Co-located group interaction design
This design theatre experience explores the use of choreographic improvisation exercises to reflect on the structures of interaction in a mobile, co-located group. The design tech...
Cecily Morrison, Alan F. Blackwell
ISTCS
1997
Springer
13 years 11 months ago
Learning with Queries Corrupted by Classification Noise
Kearns introduced the "statistical query" (SQ) model as a general method for producing learning algorithms which are robust against classification noise. We extend this ...
Jeffrey C. Jackson, Eli Shamir, Clara Shwartzman
ICASSP
2009
IEEE
13 years 5 months ago
A game theoretical algorithm for joint power and topology control in distributed WSN
In this paper, the issue of network topology control in wireless networks using a fully distributed algorithm is considered. Whereas the proposed distributed algorithm is designed...
Pau Closas, Alba Pages-Zamora, Juan A. Ferná...