Sciweavers

334 search results - page 18 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 5 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CSL
2011
Springer
14 years 6 months ago
Designing and evaluating a wizarded uncertainty-adaptive spoken dialogue tutoring system
We describe the design and evaluation of two different dynamic student uncertainty adaptations in wizarded versions of a spoken dialogue tutoring system. The two adaptive systems...
Katherine Forbes-Riley, Diane J. Litman
DRM
2007
Springer
15 years 6 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
COLING
2010
14 years 6 months ago
Filtered Ranking for Bootstrapping in Event Extraction
Several researchers have proposed semi-supervised learning methods for adapting event extraction systems to new event types. This paper investigates two kinds of bootstrapping met...
Shasha Liao, Ralph Grishman