Sciweavers

1154 search results - page 97 / 231
» Making Self-organizing Systems Secure
Sort
View
IEEECIT
2009
IEEE
15 years 8 months ago
Dynamic Software Product Lines for Service-Based Systems
—Ageing populations and the necessity to reduce environmental impact raise new challenges on our living buildings. Convergence of home control systems (air conditioning, light ma...
Paul Istoan, Grégory Nain, Gilles Perrouin,...
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 6 months ago
A reputation system for selling human computation
We describe a reputation-driven market that motivates human computation sellers (workers) to produce optimal levels of quality when quality is not immediately measurable and contr...
Trevor Burnham, Rahul Sami
CCS
2004
ACM
15 years 7 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
ISI
2007
Springer
15 years 1 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 7 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht