Sciweavers

5804 search results - page 1126 / 1161
» Doing more with less
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
14 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
CONCURRENCY
2007
118views more  CONCURRENCY 2007»
14 years 11 months ago
Design and implementation issues for distributed CCA framework interoperability
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
CONSTRAINTS
2007
89views more  CONSTRAINTS 2007»
14 years 11 months ago
Cardinal: A Finite Sets Constraint Solver
In this paper we present Cardinal, a general finite sets constraint solver just made publicly available in ECLiPSe Prolog, suitable for combinatorial problem solving by exploiting ...
Francisco Azevedo
JAIR
2008
157views more  JAIR 2008»
14 years 11 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
IJSWIS
2006
168views more  IJSWIS 2006»
14 years 11 months ago
Unraveling the Taste Fabric of Social Networks
Popular online social networks such as Friendster and MySpace do more than simply reveal the superficial structure of social connectedness--the rich meanings bottled within social...
Hugo Liu, Pattie Maes, Glorianna Davenport
« Prev « First page 1126 / 1161 Last » Next »