Sciweavers

1497 search results - page 259 / 300
» Online Negative Databases
Sort
View
114
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
111
Voted
CLEF
2006
Springer
15 years 6 months ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
117
Voted
ECTEL
2006
Springer
15 years 6 months ago
iCamp - The Educational Web for Higher Education
iCamp is an EC-funded research project in the area of Technology Enhanced Learning (TEL) that aims to support collaboration and social networking across systems, countries and disc...
Barbara Kieslinger, Fridolin Wild, Onur Ihsan Arsu...
117
Voted
CBMS
2001
IEEE
15 years 6 months ago
IBMAS: An Internet Based Medical Archive System
This paper presents an Internet-Based Medical Archive System, thus called IBMAS. IBMAS is a prototype system of a proposed paradigm of research aiming at building up a distributed...
Zhongfei (Mark) Zhang, Guangbiao Pu, Andrzej Kr&oa...
125
Voted
AAAI
2007
15 years 5 months ago
Gender-Sensitive Automated Negotiators
This paper introduces an innovative approach for automated negotiating using the gender of human opponents. Our approach segments the information acquired from previous opponents,...
Ron Katz, Sarit Kraus