Sciweavers

438 search results - page 35 / 88
» Defending Critical Infrastructure
Sort
View
RAID
1999
Springer
14 years 1 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
PUC
2006
89views more  PUC 2006»
13 years 8 months ago
UbiqStack: a taxonomy for a ubiquitous computing software stack
This paper describes a taxonomy for a ubiquitous computing software stack called UbiqStack. Through the lens of the UbiqStack taxonomy we survey a variety of subsystems designed to...
Martin Modahl, Bikash Agarwalla, T. Scott Saponas,...
CN
2010
112views more  CN 2010»
13 years 6 months ago
An Internet without the Internet protocol
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses unders...
Craig A. Shue, Minaxi Gupta
ATAL
2007
Springer
14 years 3 months ago
Advice taking in multiagent reinforcement learning
This paper proposes the β-WoLF algorithm for multiagent reinforcement learning (MARL) in the stochastic games framework that uses an additional “advice” signal to inform agen...
Michael Rovatsos, Alexandros Belesiotis
CEAS
2006
Springer
14 years 16 days ago
Fast Uncertainty Sampling for Labeling Large E-mail Corpora
One of the biggest challenges in building effective anti-spam solutions is designing systems to defend against the everevolving bag of tricks spammers use to defeat them. Because ...
Richard Segal, Ted Markowitz, William Arnold