Sciweavers

1265 search results - page 89 / 253
» Computer poker: A review
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CHI
2009
ACM
15 years 10 months ago
Three environmental discourses in human-computer interaction
A review of the past decade of human-computer interaction relating to environmental issues identifies three discourses whose commitments and assumptions have consequences for the ...
Elizabeth Goodman
SAGA
2009
Springer
15 years 4 months ago
Scenario Reduction Techniques in Stochastic Programming
Stochastic programming problems appear as mathematical models for optimization problems under stochastic uncertainty. Most computational approaches for solving such models are base...
Werner Römisch
BIRTHDAY
2005
Springer
15 years 3 months ago
Graph Transformation in Molecular Biology
In the beginning, one of the main fields of application of graph transformation was biology, and more specifically morphology. Later, however, it was like if the biological appli...
Francesc Rosselló, Gabriel Valiente
NEUROSCIENCE
2001
Springer
15 years 2 months ago
Plasticity and Nativism: Towards a Resolution of an Apparent Paradox
: Recent research in brain development and cognitive development leads to an apparent paradox. One set of recent experiments suggests that infants are well-endowed with sophisticat...
Gary F. Marcus