Sciweavers

677 search results - page 90 / 136
» A New Start-Up Demonstration Test
Sort
View
IMC
2004
ACM
15 years 5 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
SACMAT
2004
ACM
15 years 5 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
MABS
2004
Springer
15 years 5 months ago
Change Your Tags Fast! - A Necessary Condition for Cooperation?
Since Holland (1993) introduced the concept of tags as a possible cooperation forming mechanism in evolving system (among other things) a number of tag models with intriguing, and ...
David Hales
GECCO
2003
Springer
110views Optimization» more  GECCO 2003»
15 years 5 months ago
Evolutionary Multiobjective Optimization for Generating an Ensemble of Fuzzy Rule-Based Classifiers
One advantage of evolutionary multiobjective optimization (EMO) algorithms over classical approaches is that many non-dominated solutions can be simultaneously obtained by their si...
Hisao Ishibuchi, Takashi Yamamoto
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
15 years 4 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel