Sciweavers

1497 search results - page 259 / 300
» Online Negative Databases
Sort
View
ACSAC
2004
IEEE
14 years 23 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
CLEF
2006
Springer
14 years 22 days ago
iCLEF 2006 Overview: Searching the Flickr WWW Photo-Sharing Repository
This paper summarizes the task design for iCLEF 2006 (the CLEF interactive track). Compared to previous years, we have proposed a radically new task: searching images in a natural...
Jussi Karlgren, Julio Gonzalo, Paul Clough
ECTEL
2006
Springer
14 years 21 days ago
iCamp - The Educational Web for Higher Education
iCamp is an EC-funded research project in the area of Technology Enhanced Learning (TEL) that aims to support collaboration and social networking across systems, countries and disc...
Barbara Kieslinger, Fridolin Wild, Onur Ihsan Arsu...
CBMS
2001
IEEE
14 years 20 days ago
IBMAS: An Internet Based Medical Archive System
This paper presents an Internet-Based Medical Archive System, thus called IBMAS. IBMAS is a prototype system of a proposed paradigm of research aiming at building up a distributed...
Zhongfei (Mark) Zhang, Guangbiao Pu, Andrzej Kr&oa...
AAAI
2007
13 years 11 months ago
Gender-Sensitive Automated Negotiators
This paper introduces an innovative approach for automated negotiating using the gender of human opponents. Our approach segments the information acquired from previous opponents,...
Ron Katz, Sarit Kraus