Sciweavers

6907 search results - page 1157 / 1382
» Securing distributed adaptation
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 11 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
IOR
2008
148views more  IOR 2008»
14 years 11 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
JCS
2008
69views more  JCS 2008»
14 years 11 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
CORR
2007
Springer
107views Education» more  CORR 2007»
14 years 11 months ago
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal’s income is exposed to non-hedgeable risk factors ar...
U. Horst, S. Moreno
95
Voted
JMM2
2006
149views more  JMM2 2006»
14 years 11 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux
« Prev « First page 1157 / 1382 Last » Next »