Sciweavers

14642 search results - page 2873 / 2929
» It's Time for a Change
Sort
View
AAMAS
2006
Springer
14 years 12 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
AI
2006
Springer
14 years 12 months ago
Backward-chaining evolutionary algorithms
Starting from some simple observations on a popular selection method in Evolutionary Algorithms (EAs)--tournament selection--we highlight a previously-unknown source of inefficien...
Riccardo Poli, William B. Langdon
AIS
2006
Springer
14 years 12 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
ALMOB
2006
102views more  ALMOB 2006»
14 years 12 months ago
Mining, compressing and classifying with extensible motifs
Background: Motif patterns of maximal saturation emerged originally in contexts of pattern discovery in biomolecular sequences and have recently proven a valuable notion also in t...
Alberto Apostolico, Matteo Comin, Laxmi Parida
FGCS
2008
105views more  FGCS 2008»
14 years 12 months ago
The Grid Workloads Archive
While large grids are currently supporting the work of thousands of scientists, very little is known about their actual use. Due to strict organizational permissions, there are fe...
Alexandru Iosup, Hui Li, Mathieu Jan, Shanny Anoep...
« Prev « First page 2873 / 2929 Last » Next »