Sciweavers

2335 search results - page 461 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
114
Voted
ATAL
2003
Springer
15 years 2 months ago
Can software agents influence human relations?: balance theory in agent-mediated communities
We sought to create a social embodied conversational agent to support group interactions, using ‘balance theory’ from social science research on human-human relations. We cond...
Hideyuki Nakanishi, Satoshi Nakazawa, Toru Ishida,...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
MOBISYS
2008
ACM
15 years 9 months ago
Efficient channel-aware rate adaptation in dynamic environments
Increasingly, 802.11 devices are being used by mobile users. This results in very dynamic wireless channels that are difficult to use efficiently. Current rate selection algorithm...
Glenn Judd, Xiaohui Wang, Peter Steenkiste
SOSP
2001
ACM
15 years 6 months ago
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance with...
David G. Andersen, Hari Balakrishnan, M. Frans Kaa...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 3 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...