Sciweavers

3883 search results - page 653 / 777
» Design mentoring based on design evolution analysis
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
136
Voted
GECCO
2007
Springer
210views Optimization» more  GECCO 2007»
15 years 10 months ago
An application of EDA and GA to dynamic pricing
E-commerce has transformed the way firms develop their pricing strategies, producing shift away from fixed pricing to dynamic pricing. In this paper, we use two different Estim...
Siddhartha Shakya, Fernando Oliveira, Gilbert Owus...
127
Voted
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
15 years 10 months ago
A novel ab-initio genetic-based approach for protein folding prediction
In this paper, a model based on genetic algorithms for protein folding prediction is proposed. The most important features of the proposed approach are: i) Heuristic secondary str...
Sergio Raul Duarte Torres, David Camilo Becerra Ro...
ICMI
2007
Springer
262views Biometrics» more  ICMI 2007»
15 years 10 months ago
Automated generation of non-verbal behavior for virtual embodied characters
In this paper we introduce a system that automatically adds different types of non-verbal behavior to a given dialogue script between two virtual embodied agents. It allows us to ...
Werner Breitfuss, Helmut Prendinger, Mitsuru Ishiz...
123
Voted
TACAS
2007
Springer
92views Algorithms» more  TACAS 2007»
15 years 10 months ago
Model Checking Liveness Properties of Genetic Regulatory Networks
Abstract. Recent studies have demonstrated the possibility to build genetic regulatory networks that confer a desired behavior to a living organism. However, the design of these ne...
Grégory Batt, Calin Belta, Ron Weiss