Sciweavers

3963 search results - page 602 / 793
» Designing for learning
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 9 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
136
Voted
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
133
Voted
SIGITE
2004
ACM
15 years 9 months ago
Implementation of object-orientation using UML in entry level software development courses
In this paper, we establish the need (based on literature and anecdotal evidence) for an infrastructure for CS1 courses to visually support problem solving from the initial proble...
Mohammad H. N. Tabrizi, Carol B. Collins, E. Ozan,...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 9 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
CHI
2010
ACM
15 years 9 months ago
Touch-display keyboards: transforming keyboards into interactive surfaces
In spite of many advances in GUI workstations, the keyboard has remained limited to text entry and basic command invocation. In this work, we introduce the Touch-Display Keyboard ...
Florian Block, Hans Gellersen, Nicolas Villar