Sciweavers

728 search results - page 97 / 146
» Bargaining with incomplete information
Sort
View
CMSB
2003
Springer
14 years 26 days ago
An Overview of Data Models for the Analysis of Biochemical Pathways
Biochemical pathways such as metabolic, regulatory or signal tranduction pathways can be viewed as interconnected processes forming an intricate network of functional and physical...
Yves Deville, David Gilbert, Jacques van Helden, S...
ESEM
2007
ACM
13 years 11 months ago
Cognitive Limits of Software Cost Estimation
This paper explores the cognitive limits of estimation in the context of software cost estimation. Two heuristics, representativeness and anchoring, motivate two experiments invol...
Ricardo Valerdi
ACSAC
2004
IEEE
13 years 11 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
EEE
2004
IEEE
13 years 11 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
INFOCOM
1995
IEEE
13 years 11 months ago
Automatic Alarm Correlation for Fault Identification
In communication networks, a large number of alarms exist to signal any abnormal behavior of the network. As network faults typically result in a number of alarms, correlating the...
Isabelle Rouvellou, George W. Hart