Sciweavers

1039 search results - page 170 / 208
» Semantic Information Interoperability in Open Networked Syst...
Sort
View
SEC
2008
13 years 10 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
SAC
2008
ACM
13 years 8 months ago
Large-scale simulation of V2V environments
Providing vehicles with enhanced ability to communicate and exchange real-time data with neighboring vehicles opens up a variety of complex challenges that can only be met by comb...
Hugo Conceição, Luís Damas, M...
ICDE
2009
IEEE
127views Database» more  ICDE 2009»
14 years 10 months ago
SbQA: A Self-Adaptable Query Allocation Process
We present a flexible query allocation framework, called Satisfaction-based Query Allocation (SbQA for short), for distributed information systems where both consumers and provider...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...
SIGCOMM
2009
ACM
14 years 3 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
UM
2010
Springer
14 years 1 months ago
Modeling Individualization in a Bayesian Networks Implementation of Knowledge Tracing
The field of intelligent tutoring systems has been using the well known knowledge tracing model, popularized by Corbett and Anderson (1995) to track individual users’ knowledge f...
Zachary A. Pardos, Neil T. Heffernan