Sciweavers

2074 search results - page 391 / 415
» Using an Object Reference Approach to Distributed Updates
Sort
View
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 9 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
AAAI
2010
13 years 8 months ago
Bayesian Matrix Factorization with Side Information and Dirichlet Process Mixtures
Matrix factorization is a fundamental technique in machine learning that is applicable to collaborative filtering, information retrieval and many other areas. In collaborative fil...
Ian Porteous, Arthur Asuncion, Max Welling
SGP
2003
13 years 8 months ago
Statistical Point Geometry
We propose a scheme for modeling point sample geometry with statistical analysis. In our scheme we depart from the current schemes that deterministically represent the attributes ...
Aravind Kalaiah, Amitabh Varshney
SMARTNET
2000
13 years 8 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou