Sciweavers

10599 search results - page 1927 / 2120
» Measure Based Regularization
Sort
View
ESORICS
2004
Springer
15 years 8 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 8 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
157
Voted
NMR
2004
Springer
15 years 8 months ago
A probabilistic approach to default reasoning
A logic is defined which in addition to propositional calculus contains several types of probabilistic operators which are applied only to propositional formulas. For every s ∈...
Miodrag Raskovic, Zoran Ognjanovic, Zoran Markovic
PRICAI
2004
Springer
15 years 8 months ago
Shape Matching for Robot Mapping
We present a novel geometric model for robot mapping based on shape. Shape similarity measure and matching techniques originating from computer vision are specially redesigned for ...
Diedrich Wolter, Longin Jan Latecki
RAID
2004
Springer
15 years 8 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
« Prev « First page 1927 / 2120 Last » Next »