Sciweavers

43264 search results - page 8245 / 8653
» Comparing models of computation
Sort
View
109
Voted
ATAL
2008
Springer
15 years 5 months ago
Nonuniform bribery
We study the concept of bribery in the situation where voters are willing to change their votes as we ask them, but where their prices depend on the nature of the change we reques...
Piotr Faliszewski
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
AUTONOMICS
2008
ACM
15 years 5 months ago
Autonomic management via dynamic combinations of reusable strategies
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Ada Diaconescu, Yoann Maurel, Philippe Lalanda
127
Voted
CCS
2008
ACM
15 years 5 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
155
Voted
CCS
2008
ACM
15 years 5 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
« Prev « First page 8245 / 8653 Last » Next »