Sciweavers

1663 search results - page 73 / 333
» Computer Security in the Real World
Sort
View
FLAIRS
2001
15 years 6 months ago
A Computational Model for Portfolios of Cooperative Heterogeneous Algorithms for Discrete Optimization
Discrete optimization problemsarise throughout many real world domainsincluding planning, decision making, and search. NP-hardin general, these problems require novel approachesto...
Eugene Santos Jr.
ITSSA
2006
91views more  ITSSA 2006»
15 years 5 months ago
Organization Detection Using Emergent Computing
: Organization is a central concept in systems. In this paper an ant algorithm for detecting organizations is presented. In a discrete-time context, at each time-step, an organizat...
Cyrille Bertelle, Antoine Dutot, Fréd&eacut...
PRESENCE
2010
130views more  PRESENCE 2010»
15 years 3 months ago
Using a P300 Brain-Computer Interface in an Immersive Virtual Environment
Brain-computer interfaces (BCIs) provide a novel form of human-computer interaction. The purpose of these systems is to aid disabled people by aording them the possibility of com...
Michael Donnerer, Anthony Steed
120
Voted
OOPSLA
2010
Springer
15 years 3 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
ISI
2005
Springer
15 years 11 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang