Sciweavers

759 search results - page 109 / 152
» What Can Be Implemented Anonymously
Sort
View
ATAL
2006
Springer
14 years 1 months ago
Towards a reference model for agent-based systems
The current state of the art in agent technology sees that several implementations of agent frameworks exist. However, there is little agreement on the terms and concepts used to ...
Pragnesh Jay Modi, Spiros Mancoridis, William M. M...
CBSE
2006
Springer
14 years 1 months ago
Virtualization of Service Gateways in Multi-provider Environments
Abstract. Today we see more and more services being brought to connected homes, such as entertainment or home automation. These services are published and operated by a variety of ...
Yvan Royon, Stéphane Frénot, Frederi...
CCS
2006
ACM
14 years 1 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
GECCO
2006
Springer
142views Optimization» more  GECCO 2006»
14 years 1 months ago
Classifier prediction based on tile coding
This paper introduces XCSF extended with tile coding prediction: each classifier implements a tile coding approximator; the genetic algorithm is used to adapt both classifier cond...
Pier Luca Lanzi, Daniele Loiacono, Stewart W. Wils...
ACSAC
2001
IEEE
14 years 1 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami