Sciweavers

4126 search results - page 760 / 826
» Modelling Electronic Organizations
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
ATAL
2004
Springer
13 years 11 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ANCS
2006
ACM
13 years 11 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
ATAL
2006
Springer
13 years 11 months ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
CIVR
2006
Springer
126views Image Analysis» more  CIVR 2006»
13 years 11 months ago
Semantics Supervised Cluster-Based Index for Video Databases
High-dimensional index is one of the most challenging tasks for content-based video retrieval (CBVR). Typically, in video database, there exist two kinds of clues for query: visual...
Zhiping Shi, Qingyong Li, Zhiwei Shi, Zhongzhi Shi