Sciweavers

91 search results - page 17 / 19
» Sources and Monitors: A Trust Model for Peer-to-Peer Network...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
POPL
2008
ACM
14 years 7 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
IMC
2006
ACM
14 years 1 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
14 years 1 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
CRIWG
2004
13 years 8 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...