Sciweavers

1663 search results - page 133 / 333
» Privacy and Identity Management
Sort
View
AP2PC
2005
Springer
15 years 6 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
WETICE
2005
IEEE
15 years 10 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
140
Voted
HCI
2007
15 years 6 months ago
Architectural Backpropagation Support for Managing Ambiguous Context in Smart Environments
Abstract. The evolution to ubiquitous information and communication networks is evident. Technology is emerging that connects everyday objects and embeds intelligence in our enviro...
Davy Preuveneers, Yolande Berbers
146
Voted
AGENTS
1997
Springer
15 years 8 months ago
Decision Making and Plan Management by Autonomous Agents: Theory, Implementation and Applications
A generic architecture for autonomous agents is presented. In commonwith other current proposals the agent is capable of reacting to and reasoning about events which occur in its ...
Subrata Kumar Das, John Fox, D. Elsdon, Peter Hamm...
CCS
2006
ACM
15 years 8 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...