Sciweavers

931 search results - page 153 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
DSN
2005
IEEE
15 years 5 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ICPADS
2005
IEEE
15 years 5 months ago
A Hierarchical Approach for Energy-Aware Distributed Embedded Intelligent Video Surveillance
Intelligent video surveillance (IVS) offers a large spectrum of different applications that have strict requirements on quality of service (QoS) and energy-efficiency. Recent emb...
Arnold Maier, Bernhard Rinner, Helmut Schwabach
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
15 years 5 months ago
Use of a genetic algorithm in brill's transformation-based part-of-speech tagger
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...
Garnett Carl Wilson, Malcolm I. Heywood
ITICSE
2004
ACM
15 years 5 months ago
Program quality with pair programming in CS1
Prior research on pair programming has found that compared to students who work alone, students who pair have shown increased confidence in their work, greater success in CS1, an...
Brian Hanks, Charlie McDowell, David Draper, Milov...
HICSS
2002
IEEE
108views Biometrics» more  HICSS 2002»
15 years 4 months ago
Network Management in ATM LEO Satellite Networks
Development of the past decade have confirmed that ATM technology has the potential of becoming the transport mechanism in many multimedia networks where high-speed traffic and Qu...
Petia Todorova