Sciweavers

2038 search results - page 255 / 408
» Loops under Strategies
Sort
View
GAMESEC
2010
15 years 2 months ago
ISPs and Ad Networks Against Botnet Ad Fraud
Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed i...
Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim...
USS
2010
15 years 2 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
CORR
2010
Springer
126views Education» more  CORR 2010»
15 years 2 months ago
Computerized adaptive testing: implementation issues
Abstract. One of the fastest evolving field among teaching and learning research is students' performance evaluation. Computer based testing systems are increasingly adopted b...
Margit Antal, Levente Erös, Attila Imre
TCS
2011
14 years 11 months ago
Smart PAC-learners
The PAC-learning model is distribution-independent in the sense that the learner must reach a learning goal with a limited number of labeled random examples without any prior know...
Malte Darnstädt, Hans-Ulrich Simon
TMC
2011
164views more  TMC 2011»
14 years 11 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger