Sciweavers

14424 search results - page 2725 / 2885
» Modeling Radio Networks
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 5 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
139
Voted
HPDC
2010
IEEE
15 years 5 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
131
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Analysis of Load-Balanced Switch with Finite Buffers
Recently the Birkhoff-von Neumann load-balanced (LB) switch has become a promising switch design due to its high scalability properties and simple control. The performance of the L...
Yury Audzevich, Yoram Ofek, Miklós Telek, B...
IAT
2008
IEEE
15 years 4 months ago
nAble Adaptive Scaffolding Agent - Intelligent Support for Novices
Scaffolding techniques allow human instructors to support novice learners in critical early stages, and to remove that support as expertise grows. This paper describes nAble, an a...
Joseph MacInnes, Stephanie Santosa, Nathan Kronenf...
AR
2007
138views more  AR 2007»
15 years 4 months ago
Integrating robotics and neuroscience: brains for robots, bodies for brains
—Researchers in robotics and artificial intelligence have often looked at biology as a source of inspiration for solving their problems. From the opposite perspective, neuroscie...
Michele Rucci, Daniel Bullock, Fabrizio Santini
« Prev « First page 2725 / 2885 Last » Next »