Sciweavers

8512 search results - page 227 / 1703
» Computing Theory With Relevance
Sort
View
176
Voted
IWIA
2006
IEEE
15 years 11 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
ACMDIS
2004
ACM
15 years 10 months ago
Easing the wait in the emergency room: building a theory of public information systems
In this paper we discuss a real world problem encountered during recent fieldwork: that of providing information in public settings when the information has both public and privat...
Eamonn O'Neill, Dawn Woodgate, Vassilis Kostakos
COCO
2003
Springer
114views Algorithms» more  COCO 2003»
15 years 10 months ago
Bounded Nondeterminism and Alternation in Parameterized Complexity Theory
We give machine characterisations and logical descriptions of a number of parameterized complexity classes. The focus of our attention is the class W[P], which we characterise as ...
Yijia Chen, Jörg Flum, Martin Grohe
KI
1998
Springer
15 years 9 months ago
From Theory to Practice in Multiagent System Design: The Case of Structural Co-operation
Abstract. In Distributed Problem-solving (DPS) systems a group of purposefully designed computational agents interact and co-ordinate their activities so as to jointly achieve a gl...
Sascha Ossowski, Ana García-Serrano, Jos&ea...
147
Voted
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
15 years 5 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata