Sciweavers

3305 search results - page 199 / 661
» Can we Rely on SQL
Sort
View
AGENTS
2000
Springer
14 years 3 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
IEEEIAS
2008
IEEE
14 years 5 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
WCRE
2009
IEEE
14 years 5 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 11 months ago
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data
Active and semi-supervised learning are important techniques when labeled data are scarce. Recently a method was suggested for combining active learning with a semi-supervised lea...
Sofus A. Macskassy
FLAIRS
2006
14 years 5 days ago
Simulated Visual Perception-Based Control for Autonomous Mobile Agents
Autonomous robots, such as automatic vacuum cleaners, toy robot dogs, and autonomous vehicles for the military, are rapidly becoming a part of everyday life. As a result the need ...
Daniel Flower, Burkhard Wünsche, Hans W. Gues...