Sciweavers

3038 search results - page 228 / 608
» Industrial evolutionary computing
Sort
View
SOUPS
2010
ACM
15 years 8 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
NSPW
2004
ACM
15 years 10 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
238
Voted
TAPIA
2009
ACM
15 years 9 months ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
141
Voted
ACMDIS
2006
ACM
15 years 10 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...
CCGRID
2001
IEEE
15 years 8 months ago
Charging Distributed Services of a Computational Grid Architecture
Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form o...
Burkhard Stiller, Jan Gerke, Placi Flury, Peter Re...