Sciweavers

244 search results - page 43 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
86
Voted
AGENTS
1997
Springer
15 years 1 months ago
Synthetic Minds
This paper discusses conditions under which some of the “higher level” mental concepts applicable to human beings might also be applicable to artificial agents. The key idea ...
Aaron Sloman
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
BMCBI
2010
82views more  BMCBI 2010»
14 years 9 months ago
SolexaQA: At-a-glance quality assessment of Illumina second-generation sequencing data
Background: Illumina's second-generation sequencing platform is playing an increasingly prominent role in modern DNA and RNA sequencing efforts. However, rapid, simple, stand...
Murray P. Cox, Daniel A. Peterson, Patrick J. Bigg...
SIGOPSE
1998
ACM
15 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
LEGE
2003
107views Education» more  LEGE 2003»
14 years 11 months ago
Design Considerations for an ELeGI Portal
ELeGI, the European Learning Grid Infrastructure, has the ambitious goal of fostering effective learning and knowledge construction through the dynamic provision of service-based ...
Colin Allison, Rosa Michaelson