Sciweavers

595 search results - page 49 / 119
» Incidence of
Sort
View
SECURWARE
2008
IEEE
14 years 2 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
CEC
2007
IEEE
14 years 2 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
ICDM
2007
IEEE
133views Data Mining» more  ICDM 2007»
14 years 2 months ago
Can the Content of Public News Be Used to Forecast Abnormal Stock Market Behaviour?
A popular theory of markets is that they are efficient: all available information is deemed to provide an accurate valuation of an asset at any time. In this paper, we consider ho...
Calum Robertson, Shlomo Geva, Rodney C. Wolff
IPCCC
2007
IEEE
14 years 2 months ago
Intelligent Highway Infrastructure for Planned Evacuations
Disasters, natural and man-made alike, pose a serious threat to the nation by taking a heavy toll in human lives, destroying the public infrastructure and production capacity, int...
Michele C. Weigle, Stephan Olariu
HOLOMAS
2007
Springer
14 years 2 months ago
Detecting Intrusions in Agent System by Means of Exception Handling
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Securityrelated exceptions are identifie...
Eric Platon, Martin Rehák, Nicolas Sabouret...