Sciweavers

6198 search results - page 1160 / 1240
» Multi-Paradigm Process Management
Sort
View
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
IMC
2009
ACM
14 years 4 months ago
IXPs: mapped?
Internet exchange points (IXPs) are an important ingredient of the Internet AS-level ecosystem—a logical fabric of the Internet made up of about 30,000 ASes and their mutual bus...
Brice Augustin, Balachander Krishnamurthy, Walter ...
ISSTA
2009
ACM
14 years 4 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
SIGECOM
2009
ACM
134views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
On representing coalitional games with externalities
We consider the issue of representing coalitional games in multiagent systems with externalities (i.e., in systems where the performance of one coalition may be affected by other ...
Tomasz P. Michalak, Talal Rahwan, Jacek Sroka, And...
SIGECOM
2009
ACM
118views ECommerce» more  SIGECOM 2009»
14 years 4 months ago
Modeling volatility in prediction markets
There is significant experimental evidence that prediction markets are efficient mechanisms for aggregating information and are more accurate in forecasting events than tradition...
Nikolay Archak, Panagiotis G. Ipeirotis
« Prev « First page 1160 / 1240 Last » Next »