Sciweavers

CIA
2008
Springer
15 years 2 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
106
Voted
CIA
2008
Springer
15 years 2 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
CIA
2008
Springer
15 years 2 months ago
Towards an Open Negotiation Architecture for Heterogeneous Agents
This paper presents the design of an open architecture for heterogeneous negotiating agents. Both the system level architecture as well as the architecture for negotiating agents a...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
CIA
2008
Springer
15 years 2 months ago
Collaborative Load-Balancing in Storage Networks Using Agent Negotiation
Abstract. The rapid advances in the computer industry allow building larger systems that require mass storage volumes. As storage space increases, its management becomes increasing...
Shay Raz, Raz Lin, Onn Shehory
CIA
2008
Springer
15 years 2 months ago
Modeling Dynamics of Relative Trust of Competitive Information Agents
In order for personal assistant agents in an ambient intelligence context to provide good recommendations, or pro-actively support humans in task allocation, a good model of what t...
Mark Hoogendoorn, S. Waqar Jaffry, Jan Treur
Intelligent Agents
Top of PageReset Settings