Sciweavers

6656 search results - page 1295 / 1332
» Change, Change, Change: Three Approaches
Sort
View
WORM
2003
13 years 10 months ago
Access for sale: a new class of worm
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...
Stuart E. Schechter, Michael D. Smith
ICMAS
2000
13 years 10 months ago
The Adaptive Agent Architecture: Achieving Fault-Tolerance Using Persistent Broker Teams
Brokers are used in many multi-agent systems for locating agents, for routing and sharing information, for managing the system, and for legal purposes, as independent third partie...
Sanjeev Kumar, Philip R. Cohen, Hector J. Levesque
ACL
1997
13 years 10 months ago
A Theory of Parallelism and the Case of VP Ellipsis
We provide a general account of parallelism in discourse, and apply it to the special case of resolving possible readings for instances of VP ellipsis. We show how several problem...
Jerry R. Hobbs, Andrew Kehler
CASCON
1997
91views Education» more  CASCON 1997»
13 years 10 months ago
Keeping virtual information resources up and running
The maintenanceofmaterializedviews in largescale environments composed of numerous heterogeneous information sources ISs, such as the WWW, has importance for the new breed of in...
Amy J. Lee, Anisoara Nica, Elke A. Rundensteiner
LISA
2000
13 years 10 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
« Prev « First page 1295 / 1332 Last » Next »