Sciweavers

3692 search results - page 694 / 739
» Active learning and its use in computer science
Sort
View
EON
2008
14 years 11 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
CCS
2010
ACM
14 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
CORR
2004
Springer
142views Education» more  CORR 2004»
14 years 9 months ago
Dynamic Localization Protocols for Mobile Sensor Networks
The ability of a sensor node to determine its physical location within a network (Localization) is of fundamental importance in sensor networks. Interpretating data from sensors i...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
NN
2000
Springer
134views Neural Networks» more  NN 2000»
14 years 9 months ago
Generic modeling of chemotactic based self-wiring of neural networks
The proper functioning of the nervous system depends critically on the intricate network of synaptic connections that are generated during the system development. During the netwo...
Ronen Segev, Eshel Ben-Jacob
EDBT
2010
ACM
133views Database» more  EDBT 2010»
15 years 4 months ago
FPGAs: a new point in the database design space
In line with the insight that “one size” of databases will not fit all application needs [19], the database community is currently exploring various alternatives to commodity...
René Müller, Jens Teubner