Sciweavers

2421 search results - page 152 / 485
» Consistency Management for Complex Applications
Sort
View
IUI
2009
ACM
16 years 1 months ago
From geek to sleek: integrating task learning tools to support end users in real-world applications
Numerous techniques exist to help users automate repetitive tasks; however, none of these methods fully support enduser creation, use, and modification of the learned tasks. We pr...
Aaron Spaulding, Jim Blythe, Will Haines, Melinda ...
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
15 years 4 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
IWIA
2006
IEEE
15 years 10 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
ARCS
2004
Springer
15 years 10 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
152
Voted
COR
2008
142views more  COR 2008»
15 years 4 months ago
Application of reinforcement learning to the game of Othello
Operations research and management science are often confronted with sequential decision making problems with large state spaces. Standard methods that are used for solving such c...
Nees Jan van Eck, Michiel C. van Wezel