Sciweavers

3451 search results - page 177 / 691
» Collaborative attack modeling
Sort
View
135
Voted
GCC
2005
Springer
15 years 10 months ago
Supporting Remote Collaboration Through Structured Activity Logging
Abstract. This paper describes an integrated architecture for online collaborative multimedia (audio and text) meetings which supports the recording of participants' audio exc...
Matt-Mouley Bouamrane, Saturnino Luz, Masood Masoo...
WOSS
2004
ACM
15 years 10 months ago
Self-managed decentralised systems using K-components and collaborative reinforcement learning
Components in a decentralised system are faced with uncertainty as how to best adapt to a changing environment to maintain or optimise system performance. How can individual compo...
Jim Dowling, Vinny Cahill
170
Voted
IUI
2009
ACM
15 years 9 months ago
Collaborative translation by monolinguals with machine translators
In this paper, we present the concept for collaborative translation, where two non-bilingual people who use different languages collaborate to perform the task of translation usin...
Daisuke Morita, Toru Ishida
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
15 years 3 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
153
Voted
CCS
2006
ACM
15 years 8 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...