Sciweavers

2714 search results - page 150 / 543
» Under the table interaction
Sort
View
CSE
2009
IEEE
14 years 4 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
ACSC
2008
IEEE
14 years 4 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
MICRO
2008
IEEE
148views Hardware» more  MICRO 2008»
14 years 4 months ago
Coordinated management of multiple interacting resources in chip multiprocessors: A machine learning approach
—Efficient sharing of system resources is critical to obtaining high utilization and enforcing system-level performance objectives on chip multiprocessors (CMPs). Although sever...
Ramazan Bitirgen, Engin Ipek, José F. Mart&...
CBMS
2007
IEEE
14 years 4 months ago
Multifaceted Hyperimage-Based Organization and Interaction with Bio-Medical Images
The abundance of complex media-rich information in state-of-the-art bio-medical sciences underlines the importance of paradigms for organizing, searching, browsing, and assimilati...
Rahul Singh, Pierre-Yves Corlobe
VIZSEC
2007
Springer
14 years 4 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols