Sciweavers

1407 search results - page 235 / 282
» Systems Theory Model for Information Security
Sort
View
IUI
2006
ACM
14 years 3 months ago
Towards intelligent QA interfaces: discourse processing for context questions
Question answering (QA) systems take users’ natural language questions and retrieve relevant answers from large repositories of free texts. Despite recent progress in QA researc...
Mingyu Sun, Joyce Y. Chai
ICSE
2008
IEEE-ACM
14 years 10 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy
ICISS
2009
Springer
14 years 3 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
CORR
2011
Springer
153views Education» more  CORR 2011»
13 years 4 months ago
Stability Analysis of Transportation Networks with Multiscale Driver Decisions
Stability of Wardrop equilibria is analyzed for dynamical transportation networks in which the drivers’ route choices are influenced by information at multiple temporal and spat...
Giacomo Como, Ketan Savla, Daron Acemoglu, Munther...
INFOCOM
2010
IEEE
13 years 7 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman