Sciweavers

1546 search results - page 158 / 310
» Thoughts on solution concepts
Sort
View
CN
2007
179views more  CN 2007»
13 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
JAIR
2008
96views more  JAIR 2008»
13 years 9 months ago
On the Value of Correlation
Correlated equilibrium generalizes Nash equilibrium to allow correlation devices. Correlated equilibrium captures the idea that in many systems there exists a trusted administrato...
Itai Ashlagi, Dov Monderer, Moshe Tennenholtz
JSA
2008
110views more  JSA 2008»
13 years 9 months ago
A model for service-oriented communication systems
Like most software products, protocols are continuously enhanced and new protocols are developed. But especially new protocols of the transport layer can not be utilized widely ea...
Bernd Reuther, Dirk Henrici
DKE
2007
111views more  DKE 2007»
13 years 9 months ago
Category ranking for personalized search
Despite the effectiveness of search engines, the persistently increasing amount of web data continuously obscures the search task. Efforts have thus concentrated on personalized...
Christos Makris, Yannis Panagis, Evangelos Sakkopo...
JSW
2008
127views more  JSW 2008»
13 years 9 months ago
Design and Implementation of a Version Management System for Reference Modeling
The central idea in reference modeling is the reutilization of the business knowledge contained in a reference model. The user's task in reference model-based construction is ...
Oliver Thomas