The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
This paper presents an agent-based approach for error detection in incident management organizations. The approach consists of several parts. First, a formal approach for the speci...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur, ...
Appropriate datasets are required at all stages of object recognition research, including learning visual models of object and scene categories, detecting and localizing instances ...
Jean Ponce, Tamara L. Berg, Mark Everingham, David...
We argue that for both defending against attacks and apprehending the scope of attacks after they are detected, there is great utility in attaining views of network activity that ...
Mark Allman, Christian Kreibich, Vern Paxson, Robi...
Abstract. Due to the actual demographic development the use of Computer-Assisted Diagnosis (CAD) systems becomes a more important part of clinical workflows and clinical decision m...