Sciweavers

1254 search results - page 215 / 251
» Making Hard Problems Harder
Sort
View
ATAL
2007
Springer
14 years 26 days ago
Resolving conflict and inconsistency in norm-regulated virtual organizations
Norm-governed virtual organizations define, govern and facilitate coordinated resource sharing and problem solving in societies of agents. With an explicit account of norms, openn...
Wamberto Weber Vasconcelos, Martin J. Kollingbaum,...
CASES
2007
ACM
14 years 26 days ago
A fast and generic hybrid simulation approach using C virtual machine
Instruction Set Simulators (ISSes) are important tools for cross-platform software development. The simulation speed is a major concern and many approaches have been proposed to i...
Lei Gao, Stefan Kraemer, Rainer Leupers, Gerd Asch...
CCS
2007
ACM
14 years 26 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 23 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
14 years 23 days ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...