Sciweavers

325 search results - page 40 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CEAS
2007
Springer
15 years 6 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
89
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 4 months ago
Evolving hash functions by means of genetic programming
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fa...
César Estébanez, Julio César ...
AMEC
2004
Springer
15 years 5 months ago
Specifying and Monitoring Market Mechanisms Using Rights and Obligations
Abstract. We provide a formal scripting language to capture the semantics of market mechanisms. The language is based on a set of welldefined principles, and is designed to captur...
Loizos Michael, David C. Parkes, Avi Pfeffer
FASE
2003
Springer
15 years 5 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
85
Voted
DSN
2002
IEEE
15 years 5 months ago
Optimizing Buffer Management for Reliable Multicast
Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissi...
Zhen Xiao, Kenneth P. Birman, Robbert van Renesse