Sciweavers

986 search results - page 109 / 198
» Protecting the Intranet Against
Sort
View
CEC
2003
IEEE
13 years 11 months ago
Increasing the accuracy of a spam-detecting artificial immune system
AbstractSpam, the electronic equivalent of junk mail, affects over 600 million users worldwide. Even as anti-spam solutions change to limit the amount of spam sent to users, the se...
Terri Oda, Tony White
MA
2000
Springer
116views Communications» more  MA 2000»
13 years 11 months ago
Strong Mobility and Fine-Grained Resource Control in NOMADS
NOMADS is a Java-based agent system that supports strong mobility (i.e., the ability to capture and transfer the full execution state of migrating agents) and safe agent execution ...
Niranjan Suri, Jeffrey M. Bradshaw, Maggie R. Bree...
USS
2008
13 years 10 months ago
Administrative and Public Verifiability: Can We Have Both?
Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit tr...
Josh Benaloh
USS
2008
13 years 10 months ago
Replayable Voting Machine Audit Logs
Audit logs are an important tool for post-election investigations, in the event of an election dispute or problem. We propose a new approach to logging that is designed to provide...
Arel Cordero, David Wagner
ASM
2008
ASM
13 years 10 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach