Sciweavers

24 search results - page 2 / 5
» Perverse Effects in Defense of Computer Systems: When More i...
Sort
View
DASC
2006
IEEE
13 years 12 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
SRDS
2010
IEEE
13 years 3 months ago
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
With the growing scale of current computing systems, traditional configuration tuning methods become less effective because they usually assume a small number of parameters in the...
Haifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji ...
ACL
2006
13 years 7 months ago
An Effective Two-Stage Model for Exploiting Non-Local Dependencies in Named Entity Recognition
This paper shows that a simple two-stage approach to handle non-local dependencies in Named Entity Recognition (NER) can outperform existing approaches that handle non-local depen...
Vijay Krishnan, Christopher D. Manning
JECR
2000
157views more  JECR 2000»
13 years 5 months ago
Optimizing Human-Computer Interaction for the Electronic Commerce Environment
The paper investigates the interaction effects between the search strategy of software agents and the subject's product class knowledge. The experimental study consists of a ...
Rex Eugene Perera
ARGMAS
2004
Springer
13 years 11 months ago
Is It Worth Arguing?
Argumentation-based negotiation (ABN) is an effective means of resolving conflicts in a multi-agent society. However, it consumes both time and computational resources for agents ...
Nishan C. Karunatillake, Nicholas R. Jennings