Sciweavers

718 search results - page 116 / 144
» From decision theory to decision aiding methodology
Sort
View
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
15 years 3 months ago
Matching People and Jobs: A Bilateral Recommendation Approach
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...
73
Voted
ICDCS
2006
IEEE
15 years 3 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
95
Voted
LICS
2006
IEEE
15 years 3 months ago
The Boundedness Problem for Monadic Universal First-Order Logic
We consider the monadic boundedness problem for least fixed points over FO formulae as a decision problem: Given a formula ϕ(X, x), positive in X, decide whether there is a unif...
Martin Otto
SAC
2005
ACM
15 years 3 months ago
Effort and accuracy analysis of choice strategies for electronic product catalogs
One crucial task for e-commerce systems is to help buyers find products that not only satisfy their preferences but also reduce their search effort. Usually the amount of availa...
Jiyong Zhang, Pearl Pu