Sciweavers

24 search results - page 1 / 5
» Perverse Effects in Defense of Computer Systems: When More i...
Sort
View
ACSAC
2000
IEEE
13 years 9 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
13 years 11 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
BMCBI
2008
89views more  BMCBI 2008»
13 years 5 months ago
Increasing the efficiency of bacterial transcription simulations: When to exclude the genome without loss of accuracy
Background: Simulating the major molecular events inside an Escherichia coli cell can lead to a very large number of reactions that compose its overall behaviour. Not only should ...
Marco A. J. Iafolla, Guang Qiang Dong, David R. Mc...
DPPI
2007
ACM
13 years 9 months ago
My agent as myself or another: effects on credibility and listening to advice
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...
IPPS
2007
IEEE
13 years 11 months ago
Capacity Sharing and Stealing in Dynamic Server-based Real-Time Systems
This paper proposes a dynamic scheduler that supports the coexistence of guaranteed and non-guaranteed bandwidth servers to efficiently handle soft-tasks’ overloads by making a...
Luís Nogueira, Luís Miguel Pinho