Sciweavers

2385 search results - page 414 / 477
» Knowledge Refinement for a Design System
Sort
View
ACSAC
2004
IEEE
14 years 18 days ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ATAL
2006
Springer
14 years 18 days ago
Negotiating efficient outcomes over multiple issues
It is difficult to reach optimal outcomes in bilateral negotiations with multiple issues when the agents' preferences and priorities of the issues are not common knowledge. S...
Sabyasachi Saha, Sandip Sen
FTDCS
2004
IEEE
14 years 17 days ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow
EDUTAINMENT
2006
Springer
14 years 16 days ago
Effects of Guided and Unguided Style Learning on User Attention in a Virtual Environment
Abstract. In this paper, we investigated the effects of guided and unguided style VR learning on user attention and retained knowledge. We conducted a study where users performed g...
Jayoung J. Goo, Kyoung Shin Park, Moonhoen Lee, Ji...
ETRICS
2006
14 years 15 days ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...