Sciweavers

1466 search results - page 95 / 294
» Evaluation Issues in Autonomic Computing
Sort
View
ESORICS
2009
Springer
15 years 1 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
DAGSTUHL
2007
14 years 11 months ago
Towards a Logic of Graded Normativity and Norm Adherence
A key focus of contemporary agent-oriented research and engineering is on open multiagent systems composed of truly autonomous, interacting agents. This poses new challenges, as en...
Matthias Nickles
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 8 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
WIMOB
2007
IEEE
15 years 4 months ago
A Gossip Protocol to Support Service Discovery with Heterogeneous Ontologies in MANETs
Service discovery in mobile ad hoc networks (MANETs) is an integral part for collective application interoperability. The discovery process must cope not only with transient commun...
Andronikos Nedos, Kulpreet Singh, Raymond Cunningh...
MOBICOM
2006
ACM
15 years 3 months ago
Status packet deprecation and store-forward routing in AUSNet
AUSNet is a functional network of autonomous undersea vehicles. We present two novel algorithms to enhance AUSNet. In live inwater testing, a packet queueing problem in which stal...
Matthew M. Haag, Emmanuel Agu, Rick Komerska, Stev...