Sciweavers

363 search results - page 49 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
IEEEAMS
2002
IEEE
14 years 19 days ago
Understanding Consistency Maintenance in Service Discovery Architectures in Response to Message Loss
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery...
Christopher Dabrowski, Kevin L. Mills, Jesse Elder
IWIA
2005
IEEE
14 years 1 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
INTERSPEECH
2010
13 years 2 months ago
Combining user intention and error modeling for statistical dialog simulators
Statistical user simulation is an efficient and effective way to train and evaluate the performance of a (spoken) dialog system. In this paper, we design and evaluate a modular da...
Silvia Quarteroni, Meritxell González, Gius...
CIBCB
2006
IEEE
14 years 1 months ago
A Stochastic model to estimate the time taken for Protein-Ligand Docking
Abstract— Quantum mechanics and molecular dynamic simulation provide important insights into structural configurations and molecular interaction data today. To extend this atomi...
Preetam Ghosh, Samik Ghosh, Kalyan Basu, Sajal K. ...