Sciweavers

1170 search results - page 176 / 234
» Experience with Ripple-Down Rules
Sort
View
APNOMS
2009
Springer
14 years 4 months ago
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding
Applications in wireless sensor networks (WSNs) experience the routing hole problem. That is, the current node cannot forward to the destination, although it is the closest node, b...
Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung...
ATAL
2009
Springer
14 years 4 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...
CIKM
2009
Springer
14 years 4 months ago
Voting in social networks
A voting system is a set of rules that a community adopts to take collective decisions. In this paper we study voting systems for a particular kind of community: electronically me...
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Se...
FGIT
2009
Springer
14 years 4 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
SPIN
2009
Springer
14 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...