Sciweavers

364 search results - page 28 / 73
» E-Voting System Security Optimization
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 7 days ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
CCS
2006
ACM
14 years 6 days ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
PADL
2012
Springer
12 years 4 months ago
Recent Advances in Declarative Networking
Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a d...
Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao,...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
12 years 11 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
14 years 1 months ago
A reputation system for selling human computation
We describe a reputation-driven market that motivates human computation sellers (workers) to produce optimal levels of quality when quality is not immediately measurable and contr...
Trevor Burnham, Rahul Sami