Sciweavers

3910 search results - page 29 / 782
» Analyzing Cross-Connected Networks
Sort
View
126
Voted
NDSS
2009
IEEE
16 years 2 days ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
138
Voted
IJCNN
2007
IEEE
15 years 11 months ago
Analyzing the Fuzzy ARTMAP Matchtracking mechanism with Co-Objective Optimization Theory
— In the process of learning a pattern I, the Fuzzy ARTMAP algorithm templates (i.e., the weight vectors corresponding to nodes of its category representation layer) compete for ...
José Castro, Michael Georgiopoulos, Jimmy S...
CMSB
2008
Springer
15 years 7 months ago
Analyzing a Discrete Model of Aplysia Central Pattern Generator
We present a discrete formal model of the central pattern generator (CPG) located in the buccal ganglia of Aplysia that is responsible for mediating the rhythmic movements of its f...
Ashish Tiwari, Carolyn L. Talcott
HICSS
2010
IEEE
182views Biometrics» more  HICSS 2010»
16 years 7 days ago
Analyzing Leadership Dynamics in Distributed Group Communication
—We apply social network analysis (SNA) to examine the dynamics of leadership in distributed groups, specifically Free/Libre Open Source Software development projects, and its r...
Kevin Crowston, Andrea Wiggins, James Howison
141
Voted
DSN
2008
IEEE
15 years 11 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...