Sciweavers

2124 search results - page 393 / 425
» Aggregating time partitions
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
INFOCOM
2003
IEEE
15 years 5 months ago
TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
— Service prioritization among different traffic classes is an important goal for the future Internet. Conventional approaches to solving this problem consider the existing best...
Aleksandar Kuzmanovic, Edward W. Knightly
SIGECOM
2003
ACM
141views ECommerce» more  SIGECOM 2003»
15 years 5 months ago
Automated mechanism design for a self-interested designer
Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to m...
Vincent Conitzer, Tuomas Sandholm
SMA
2003
ACM
169views Solid Modeling» more  SMA 2003»
15 years 5 months ago
Surface reconstruction of freeform objects based on multiresolution volumetric method
3D scanners developed over the past several decades have facilitated the reconstruction of complicated engineering parts. Typically the boundary representation of a part is recons...
Sergei Azernikov, Alex Miropolsky, Anath Fischer
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
15 years 5 months ago
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We rep...
Ying Xiao, Winfried Just