Sciweavers

948 search results - page 104 / 190
» Making a Game of Network Security
Sort
View
PRICAI
2000
Springer
15 years 1 months ago
Trading Off Granularity against Complexity
The automated prediction of a user's interests and requirements is an area of interest to the Artificial Intelligence community. However, current predictive statistical approa...
Ingrid Zukerman, David W. Albrecht, Ann E. Nichols...
WSC
2004
14 years 11 months ago
Solving Stochastic Mathematical Programs with Complementarity Constraints Using Simulation
Recently, simulation-based methods have been successfully used for solving challenging stochastic optimization problems and equilibrium models. Here we report some of the recent p...
S. Ilker Birbil, Gül Gürkan, Ovidiu List...
IJET
2008
197views more  IJET 2008»
14 years 10 months ago
TENTube: A Video-based Connection Tool Supporting Competence Development
The vast majority of knowledge management initiatives fail because they do not take sufficiently into account the emotional, psychological and social needs of individuals. Only if ...
Albert A. Angehrn, Katrina Diane Maxwell
EUROPKI
2004
Springer
15 years 3 months ago
Trustworthy Accounting for Wireless LAN Sharing Communities
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
Elias C. Efstathiou, George C. Polyzos
LISA
2007
15 years 8 days ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar