Sciweavers

782 search results - page 154 / 157
» Optimal social laws
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
14 years 9 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
CORR
2006
Springer
160views Education» more  CORR 2006»
14 years 9 months ago
Frugality ratios and improved truthful mechanisms for vertex cover
In set-system auctions, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The auctioneer's goal is to hire a team and pay...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
ISF
2006
118views more  ISF 2006»
14 years 9 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
COLING
2002
14 years 9 months ago
Data-driven Classification of Linguistic Styles in Spoken Dialogues
Language users have individual linguistic styles. A spoken dialogue system may benefit from adapting to the linguistic style of a user in input analysis and output generation. To ...
Thomas Portele