Sciweavers

1098 search results - page 180 / 220
» Proactive Intrusion Detection
Sort
View
AGENTS
2000
Springer
15 years 4 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
AMI
2008
Springer
15 years 1 months ago
Analysis of Heart Stress Response for a Public Talk Assistant System
Conference presentations are stressful communication tasks for many speakers. This mental stress inhibits the speaker's ability to recall information and perceive the audience...
Martin Kusserow, Oliver Amft, Gerhard Tröster
CN
2007
137views more  CN 2007»
14 years 11 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IJAHUC
2006
71views more  IJAHUC 2006»
14 years 11 months ago
Elapsed time on arrival: a simple and versatile primitive for canonical time synchronisation services
: Time synchronisation is one of the most important and fundamental middleware services for wireless sensor networks. However, there is an apparent disconnect between existing time...
Branislav Kusy, Prabal Dutta, Philip Levis, Mikl&o...
IJWIN
2006
119views more  IJWIN 2006»
14 years 11 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...