Sciweavers

3516 search results - page 512 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SIGUCCS
2000
ACM
15 years 8 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar
WIDM
2003
ACM
15 years 9 months ago
Conceptual modeling of semantic navigation structures: the MoSeNa-approach
At the present time, several shortcomings prevent the more effective use and more intense application of web information systems. Recent developments that are subsumed by the term...
Jörg Becker, Christian Brelage, Karsten Klose...
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolution of Voronoi based fuzzy recurrent controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to auto...
Carlos Kavka, Patricia Roggero, Marc Schoenauer
IPCCC
2006
IEEE
15 years 10 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
SIGIR
2010
ACM
15 years 8 months ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...