Sciweavers

13717 search results - page 2289 / 2744
» Control Systems
Sort
View
145
Voted
ISSA
2004
15 years 6 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
IJCAI
2001
15 years 6 months ago
Planning with Resources and Concurrency: A Forward Chaining Approach
Recently tremendous advances have been made in the performance of AI planning systems. However increased performance is only one of the prerequisites for bringing planning into th...
Fahiem Bacchus, Michael Ady
EUSFLAT
2003
143views Fuzzy Logic» more  EUSFLAT 2003»
15 years 6 months ago
Prediction of surface roughness in ultraprecision turning using fuzzy logic
Ultraprecision turning is a manufacturing process used to generate a high surface roughness in precision components, and its input-output relationships are highly nonlinear. Surfa...
Arup Kumar Nandi
OPODIS
2004
15 years 6 months ago
Task Assignment Based on Prioritising Traffic Flows
Abstract. We consider the issue of task assignment in a distributed system under heavy-tailed (ie. highly variable) workloads. A new adaptable approach called TAPTF (Task Assignmen...
James Broberg, Zahir Tari, Panlop Zeephongsekul
128
Voted
USS
2004
15 years 6 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
« Prev « First page 2289 / 2744 Last » Next »