Sciweavers

4166 search results - page 493 / 834
» Automating the constraining process
Sort
View
DSN
2009
IEEE
15 years 2 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
153
Voted
ICCBR
2009
Springer
15 years 2 months ago
Toward Modeling and Teaching Legal Case-Based Adaptation with Expert Examples
Studying examples of expert case-based adaptation could advance computational modeling but only if the examples can be succinctly represented and reliably interpreted. Supreme Cour...
Kevin D. Ashley, Collin Lynch, Niels Pinkwart, Vin...
IFIP12
2009
15 years 2 months ago
Defining a Task's Temporal Domain for Intelligent Calendar Applications
Abstract Intelligent calendar assistants have many years ago attracted researchers from the areas of scheduling, machine learning and human computer interaction. However, all effor...
Anastasios Alexiadis, Ioannis Refanidis
CCR
2011
15 years 48 min ago
HTTP in the home: it is not just about PCs
HTTP (Hypertext Transport Protocol) was originally primarily used for human-initiated client-server communications launched from web browsers, traditional computers and laptops. H...
Jeffrey Erman, Alexandre Gerber, Subhabrata Sen
94
Voted
EWC
2011
52views more  EWC 2011»
14 years 12 months ago
Localized coarsening of conforming all-hexahedral meshes
Abstract. Finite element mesh adaptation methods can be used to improve the efficiency and accuracy of solutions to computational modeling problems. In many applications involving ...
Adam C. Woodbury, Jason F. Shepherd, Matthew L. St...