Sciweavers

3229 search results - page 159 / 646
» Theories with the Independence Property
Sort
View
127
Voted
IPPS
2008
IEEE
15 years 7 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
92
Voted
ISVD
2007
IEEE
15 years 7 months ago
Voronoi Diagrams for Oriented Spheres
We consider finite sets of oriented spheres in Rk−1 and, by interpreting such spheres as points in Rk , study the Voronoi diagrams they induce for several variants of distance ...
Franz Aurenhammer, Johannes Wallner, Martin Petern...
94
Voted
ATAL
2005
Springer
15 years 6 months ago
The value of privacy: optimal strategies for privacy minded agents
Agents often want to protect private information, while at the same acting upon the information. These two desires are in conflict, and this conflict can be modeled in strategic...
Sieuwert van Otterloo
FSKD
2005
Springer
137views Fuzzy Logic» more  FSKD 2005»
15 years 6 months ago
Vagueness and Extensionality
Abstract. We introduce a property of set to represent vagueness without using truth value. It has gotten less attention in fuzzy set theory. We introduce it by analyzing a well-kno...
Shunsuke Yatabe, Hiroyuki Inaoka
77
Voted
HICSS
2002
IEEE
105views Biometrics» more  HICSS 2002»
15 years 5 months ago
The Back-Office of E-government (Managing Information Domains as Political Economies)
Many governmental organizations nowadays are setting up e-government initiatives to improve the delivery of services to citizens. Often, these initiatives require information exch...
Vincent Homburg, Victor Bekkers