Sciweavers

1117 search results - page 174 / 224
» A Compliance Model of Trust
Sort
View
CEEMAS
2007
Springer
15 years 6 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
CEC
2005
IEEE
15 years 5 months ago
The emergence of cooperation among agents using simple fixed bias tagging
AbstractThe principle of cooperation influences our everyday lives. This conflict between individual and collective rationality can be modelled through the use of social dilemmas...
Enda Howley, Colm O'Riordan
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 5 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
NSPW
2004
ACM
15 years 5 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
ADVIS
2004
Springer
15 years 5 months ago
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme
Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...