Sciweavers

3305 search results - page 199 / 661
» Can we Rely on SQL
Sort
View
89
Voted
AGENTS
2000
Springer
15 years 5 months ago
The Socio-cognitive Dynamics of Trust: Does Trust Create Trust?
We will examine in this paper three crucial aspects of trust dynamics: a) How A’s trusting B and relying on it in situation can actually (objectively) influence B’s trustworth...
Rino Falcone, Cristiano Castelfranchi
IEEEIAS
2008
IEEE
15 years 7 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
WCRE
2009
IEEE
15 years 7 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 1 months ago
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data
Active and semi-supervised learning are important techniques when labeled data are scarce. Recently a method was suggested for combining active learning with a semi-supervised lea...
Sofus A. Macskassy
103
Voted
FLAIRS
2006
15 years 2 months ago
Simulated Visual Perception-Based Control for Autonomous Mobile Agents
Autonomous robots, such as automatic vacuum cleaners, toy robot dogs, and autonomous vehicles for the military, are rapidly becoming a part of everyday life. As a result the need ...
Daniel Flower, Burkhard Wünsche, Hans W. Gues...