Sciweavers

507 search results - page 4 / 102
» Defensive Marketing Strategies
Sort
View
AI
2007
Springer
13 years 11 months ago
A Profit-Based Business Model for Evaluating Rule Interestingness
Different types of rules are mined from transaction databases often with the goal of improving sales and services. In this paper, we link the interestingness of rules with the cont...
Yaohua Chen, Yan Zhao, Yiyu Yao
ECAI
2008
Springer
13 years 9 months ago
IAMwildCAT: The Winning Strategy for the TAC Market Design Competition
Abstract. In this paper we describe the IAMwildCAT agent, designed for the TAC Market Design game which is part of the International Trading Agent Competition. The objective of an ...
Perukrishnen Vytelingum, Ioannis A. Vetsikas, Bing...
IWDW
2005
Springer
14 years 1 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
CSR
2008
Springer
13 years 9 months ago
Cracks in the Defenses: Scouting Out Approaches on Circuit Lower Bounds
Razborov and Rudich identified an imposing barrier that stands in the way of progress toward the goal of proving superpolynomial lower bounds on circuit size. Their work on "n...
Eric Allender
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 7 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...