Sciweavers

269 search results - page 39 / 54
» Who Thinks Who Knows Who
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
TISSEC
2010
72views more  TISSEC 2010»
13 years 5 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
EDBTW
2010
Springer
13 years 5 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
WINE
2010
Springer
153views Economy» more  WINE 2010»
13 years 5 months ago
Approximation Schemes for Sequential Posted Pricing in Multi-unit Auctions
We design algorithms for computing approximately revenue-maximizing sequential postedpricing mechanisms (SPM) in K-unit auctions, in a standard Bayesian model. A seller has K copi...
Tanmoy Chakraborty, Eyal Even-Dar, Sudipto Guha, Y...
CGF
2010
168views more  CGF 2010»
13 years 4 months ago
How to Write a Visualization Research Paper: A Starting Point
This paper attempts to explain the mechanics of writing a research paper in visualization. This serves as a useful starting point for those who have never written a research paper...
Robert S. Laramee