Sciweavers

10435 search results - page 1811 / 2087
» Measuring system normality
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
AI
2006
Springer
15 years 8 months ago
Partial Local FriendQ Multiagent Learning: Application to Team Automobile Coordination Problem
Real world multiagent coordination problems are important issues for reinforcement learning techniques. In general, these problems are partially observable and this characteristic ...
Julien Laumonier, Brahim Chaib-draa
ATAL
2006
Springer
15 years 8 months ago
Reducing price fluctuation in continuous double auctions through pricing policy and shout improvement
Auction mechanism design is a subfield of game theory dedicated to manipulating the rules of an auction so as to achieve specific goals. The complexity of the dynamics of auctions...
Jinzhong Niu, Kai Cai, Simon Parsons, Elizabeth Sk...
ATAL
2006
Springer
15 years 8 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
CCS
2006
ACM
15 years 8 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
« Prev « First page 1811 / 2087 Last » Next »