Sciweavers

704 search results - page 106 / 141
» Discovering Itemset Interactions
Sort
View
TACAS
2005
Springer
155views Algorithms» more  TACAS 2005»
15 years 3 months ago
Context-Bounded Model Checking of Concurrent Software
The interaction among concurrently executing threads of a program results in insidious programming errors that are difficult to reproduce and fix. Unfortunately, the problem of ve...
Shaz Qadeer, Jakob Rehof
SIGSOFT
2004
ACM
15 years 3 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
UIST
2004
ACM
15 years 3 months ago
Automatic projector calibration with embedded light sensors
Projection technology typically places several constraints on the geometric relationship between the projector and the projection surface to obtain an undistorted, properly sized ...
Johnny C. Lee, Paul H. Dietz, Dan Maynes-Aminzade,...
88
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
70
Voted
HUC
2004
Springer
15 years 3 months ago
The NearMe Wireless Proximity Server
Abstract. NearMe is a server, algorithms, and application programming interfaces (APIs) for clients equipped with 802.11 wireless networking (Wi-Fi) to compute lists of people and ...
John Krumm, Ken Hinckley