Sciweavers

438 search results - page 35 / 88
» Defending Critical Infrastructure
Sort
View
95
Voted
RAID
1999
Springer
15 years 4 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
PUC
2006
89views more  PUC 2006»
15 years 14 days ago
UbiqStack: a taxonomy for a ubiquitous computing software stack
This paper describes a taxonomy for a ubiquitous computing software stack called UbiqStack. Through the lens of the UbiqStack taxonomy we survey a variety of subsystems designed to...
Martin Modahl, Bikash Agarwalla, T. Scott Saponas,...
122
Voted
CN
2010
112views more  CN 2010»
14 years 10 months ago
An Internet without the Internet protocol
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses unders...
Craig A. Shue, Minaxi Gupta
ATAL
2007
Springer
15 years 6 months ago
Advice taking in multiagent reinforcement learning
This paper proposes the β-WoLF algorithm for multiagent reinforcement learning (MARL) in the stochastic games framework that uses an additional “advice” signal to inform agen...
Michael Rovatsos, Alexandros Belesiotis
CEAS
2006
Springer
15 years 4 months ago
Fast Uncertainty Sampling for Labeling Large E-mail Corpora
One of the biggest challenges in building effective anti-spam solutions is designing systems to defend against the everevolving bag of tricks spammers use to defeat them. Because ...
Richard Segal, Ted Markowitz, William Arnold