Sciweavers

325 search results - page 6 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
AMEC
2004
Springer
14 years 29 days ago
A Mechanism for Multiple Goods and Interdependent Valuations
Abstract. This paper reports on the design of an auction mechanism for allocating multiple goods when the buyers have interdependent valuations. We cast the problem as a multi-agen...
Rajdeep K. Dash, Alex Rogers, Nicholas R. Jennings
ECOOP
1997
Springer
13 years 11 months ago
Subtyping Is Not a Good "Match" for Object-Oriented Languages
We present the design and rationale of a new statically-typed object-oriented language, LOOM. LOOM retains most of the features of the earlier language PolyTOIL. However the subtyp...
Kim B. Bruce, Leaf Petersen, Adrian Fiech
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
LCTRTS
1998
Springer
13 years 11 months ago
Using UML for Modeling Complex Real-Time Systems
The embedded real-time software systems encountered in applications such as telecommunications, aerospace, and defense typically tend to be large and extremely complex. It is cruc...
Bran Selic
ISW
2009
Springer
14 years 2 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...