Sciweavers

1387 search results - page 250 / 278
» Algorithms for Interactive Editing of Level Set Models
Sort
View
SOSP
2005
ACM
16 years 1 months ago
Connections: using context to enhance file search
Connections is a file system search tool that combines traditional content-based search with context information gathered from user activity. By tracing file system calls, Conne...
Craig A. N. Soules, Gregory R. Ganger
IISWC
2008
IEEE
15 years 11 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
ACSAC
2005
IEEE
15 years 10 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
GECCO
2005
Springer
135views Optimization» more  GECCO 2005»
15 years 10 months ago
The impact of cellular representation on finite state agents for prisoner's dilemma
The iterated prisoner’s dilemma is a widely used computational model of cooperation and conflict. Many studies report emergent cooperation in populations of agents trained to p...
Daniel A. Ashlock, Eun-Youn Kim
APLAS
2004
ACM
15 years 10 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann