Sciweavers

575 search results - page 87 / 115
» A model for evaluating IT security investments
Sort
View
SPW
1999
Springer
15 years 6 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
AGENTS
1998
Springer
15 years 6 months ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
ACSAC
2004
IEEE
15 years 5 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
LREC
2008
102views Education» more  LREC 2008»
15 years 3 months ago
Unsupervised Learning-based Anomalous Arabic Text Detection
The growing dependence of modern society on the Web as a vital source of information and communication has become inevitable. However, the Web has become an ideal channel for vari...
Nasser Abouzakhar, Ben Allison, Louise Guthrie
JSS
2008
136views more  JSS 2008»
15 years 1 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...