Sciweavers

342 search results - page 61 / 69
» An Adaptation Logic Framework for Java-based Component Syste...
Sort
View
AAAI
2011
13 years 9 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 4 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
95
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ERCIMDL
2001
Springer
171views Education» more  ERCIMDL 2001»
15 years 2 months ago
MARIAN: Flexible Interoperability for Federated Digital Libraries
Federated digital libraries are composed of distributed, autonomous, and often heterogeneous information services but provide users with a transparent, integrated view of collected...
Marcos André Gonçalves, Robert K. Fr...
ACMSE
2011
ACM
13 years 9 months ago
Targeting FPGA-based processors for an implementation-driven compiler construction course
This paper describes the adaptation of a modern compiler construction course to target an FPGA-based hardware platform used throughout our computer science curriculum. One of the ...
D. Brian Larkins, William M. Jones