Sciweavers

3505 search results - page 6 / 701
» Information Theory and the IrisCode
Sort
View
DSN
2011
IEEE
13 years 9 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
HCI
2009
14 years 7 months ago
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
This paper will look at the human predisposition to oral tradition and its effectiveness as a learning tool to convey mission-critical information. After exploring the effectivenes...
Joseph Juhnke, Adam R. Kallish
89
Voted
CCS
2011
ACM
13 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 5 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
COCOON
2007
Springer
15 years 3 months ago
Information Distance from a Question to an Answer
We provide three key missing pieces of a general theory of information distance [3, 23, 24]. We take bold steps in formulating a revised theory to avoid some pitfalls in practical...
Ming Li