Sciweavers

610 search results - page 102 / 122
» Application-level Simulation for Network Security
Sort
View
IJCNN
2006
IEEE
15 years 3 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...
SECPERU
2006
IEEE
15 years 3 months ago
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web
To assess the trustworthiness of the information published in the World Wide Web referrals are often employed. This is due to the fact that most information sources are visited on...
Vangelis G. Bintzios, Thanasis G. Papaioannou, Geo...
SAC
2005
ACM
15 years 3 months ago
A distributed content-based search engine based on mobile code
Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this proc...
Volker Roth, Ulrich Pinsdorf, Jan Peters
AGENTS
2000
Springer
15 years 2 months ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
AGENTS
1997
Springer
15 years 1 months ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes