Sciweavers

5684 search results - page 1074 / 1137
» Computing with active dendrites
Sort
View
ISW
2010
Springer
15 years 1 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
TRIDENTCOM
2010
IEEE
15 years 1 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
HCI
2009
15 years 1 months ago
Context-Aware Cognitive Agent Architecture for Ambient User Interfaces
An ambient user interface is a set of hidden intelligent interfaces that recognize user's presence and provides services to immediate needs. There are several research activit...
Youngho Lee, Choonsung Shin, Woontack Woo
ASSETS
2010
ACM
14 years 11 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
IDA
2011
Springer
14 years 10 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
« Prev « First page 1074 / 1137 Last » Next »