Sciweavers

948 search results - page 30 / 190
» Making a Game of Network Security
Sort
View
DSRT
2000
IEEE
14 years 1 months ago
Scheduling for Very Large Virtual Environments and Networked Games Using Visibility and Priorities
The problem of network bundwidth limitutions is encountered in ulmost uny distributed virtuul environment or networkedgume. In U typicul client-serversetup, where the virtuul worl...
Chris Faisstnauer, Dieter Schmalstieg, Werner Purg...
INFOCOM
2008
IEEE
14 years 3 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
COMPSAC
2008
IEEE
14 years 3 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
AIIDE
2006
13 years 10 months ago
Incorporating Advice into Neuroevolution of Adaptive Agents
Neuroevolution is a promising learning method in tasks with extremely large state and action spaces and hidden states. Recent advances allow neuroevolution to take place in real t...
Chern Han Yong, Kenneth O. Stanley, Risto Miikkula...
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
12 years 11 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala