Sciweavers

1387 search results - page 250 / 278
» Algorithms for Interactive Editing of Level Set Models
Sort
View
SOSP
2005
ACM
15 years 6 months ago
Connections: using context to enhance file search
Connections is a file system search tool that combines traditional content-based search with context information gathered from user activity. By tracing file system calls, Conne...
Craig A. N. Soules, Gregory R. Ganger
IISWC
2008
IEEE
15 years 4 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
ACSAC
2005
IEEE
15 years 3 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
GECCO
2005
Springer
135views Optimization» more  GECCO 2005»
15 years 3 months ago
The impact of cellular representation on finite state agents for prisoner's dilemma
The iterated prisoner’s dilemma is a widely used computational model of cooperation and conflict. Many studies report emergent cooperation in populations of agents trained to p...
Daniel A. Ashlock, Eun-Youn Kim
APLAS
2004
ACM
15 years 3 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann