Sciweavers

325 search results - page 40 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CEAS
2007
Springer
14 years 1 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 11 months ago
Evolving hash functions by means of genetic programming
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fa...
César Estébanez, Julio César ...
AMEC
2004
Springer
14 years 1 months ago
Specifying and Monitoring Market Mechanisms Using Rights and Obligations
Abstract. We provide a formal scripting language to capture the semantics of market mechanisms. The language is based on a set of welldefined principles, and is designed to captur...
Loizos Michael, David C. Parkes, Avi Pfeffer
FASE
2003
Springer
14 years 26 days ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
DSN
2002
IEEE
14 years 18 days ago
Optimizing Buffer Management for Reliable Multicast
Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissi...
Zhen Xiao, Kenneth P. Birman, Robbert van Renesse