Sciweavers

1224 search results - page 199 / 245
» Theory decision by decomposition
Sort
View
DASC
2006
IEEE
14 years 5 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
14 years 5 months ago
Matching People and Jobs: A Bilateral Recommendation Approach
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...
ICDCS
2006
IEEE
14 years 5 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
INFOCOM
2006
IEEE
14 years 5 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
LICS
2006
IEEE
14 years 5 months ago
The Boundedness Problem for Monadic Universal First-Order Logic
We consider the monadic boundedness problem for least fixed points over FO formulae as a decision problem: Given a formula ϕ(X, x), positive in X, decide whether there is a unif...
Martin Otto