Sciweavers

1358 search results - page 244 / 272
» Diverse Firewall Design
Sort
View
CCS
2007
ACM
15 years 6 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
GECCO
2007
Springer
160views Optimization» more  GECCO 2007»
15 years 6 months ago
Hill climbing on discrete HIFF: exploring the role of DNA transposition in long-term artificial evolution
We show how a random mutation hill climber that does multilevel selection utilizes transposition to escape local optima on the discrete Hierarchical-If-And-Only-If (HIFF) problem....
Susan Khor
SEMWEB
2007
Springer
15 years 5 months ago
Cultural Adaptivity for the Semantic Web
Our research explores the possibilities for factoring culture into user models, working towards cultural adaptivity in the semantic web. The aim is to represent the user’s positi...
Katharina Reinecke
AVSS
2006
IEEE
15 years 5 months ago
Multimedia Surveillance and Monitoring
Most surveillance and monitoring systems nowadays utilize multiple types of sensors. However, due to the asynchrony among and diversity of sensors, information assimilation how to...
Mohan S. Kankanhalli
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
15 years 5 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara