Sciweavers

619 search results - page 83 / 124
» Learning with Security
Sort
View
AGENTS
1997
Springer
14 years 1 months ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes
AGENTS
1997
Springer
14 years 1 months ago
Creatures: Artificial Life Autonomous Software Agents for Home Entertainment
This paper gives a technical description of Creatures, a commercial home-entertainment software package. Creatures provides a simulated environment in which exist a number of synt...
Stephen Grand, Dave Cliff, Anil Malhotra
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
14 years 28 days ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
ICAI
2008
13 years 10 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
LREC
2008
102views Education» more  LREC 2008»
13 years 10 months ago
Unsupervised Learning-based Anomalous Arabic Text Detection
The growing dependence of modern society on the Web as a vital source of information and communication has become inevitable. However, the Web has become an ideal channel for vari...
Nasser Abouzakhar, Ben Allison, Louise Guthrie