Sciweavers

350 search results - page 40 / 70
» An artificial immune system architecture for computer securi...
Sort
View
SIGCOMM
2010
ACM
14 years 12 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
AGENTS
1997
Springer
15 years 4 months ago
Integrated Premission Planning and Execution for Unmanned Ground Vehicles
Fielding robots in complex applications can stress the human operators responsible for supervising them, particularly because the operators might understand the applications but n...
Edmund H. Durfee, Patrick G. Kenny, Karl C. Kluge
96
Voted
ICDCSW
2003
IEEE
15 years 5 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
DIAGRAMS
2004
Springer
15 years 5 months ago
Cider: A Component-Based Toolkit for Creating Smart Diagram Environments
— Smart Diagram Environments (SDEs) are software applications that use structured diagrams to provide a natural visual interface that behaves as if the computer “understands”...
Anthony R. Jansen, Kim Marriott, Bernd Meyer
CVPR
2005
IEEE
16 years 1 months ago
Learning a Similarity Metric Discriminatively, with Application to Face Verification
We present a method for training a similarity metric from data. The method can be used for recognition or verification applications where the number of categories is very large an...
Sumit Chopra, Raia Hadsell, Yann LeCun