Sciweavers

1888 search results - page 124 / 378
» Proof theory and computational analysis
Sort
View
ATAL
2009
Springer
15 years 7 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
DNA
2006
Springer
146views Bioinformatics» more  DNA 2006»
15 years 4 months ago
On Times to Compute Shapes in 2D Tile Self-assembly
We study the times to grow structures within the tile self-assembly model proposed by Winfree, and the possible shapes that can be achieved. Our earlier work was confined to the g...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Boons...
112
Voted
VIROLOGY
2008
84views more  VIROLOGY 2008»
15 years 14 days ago
Formal affordance-based models of computer virus reproduction
We present a novel classification of computer viruses using a formalised notion of reproductive models based on Gibson's theory of affordances. A computer virus reproduction ...
Matt Webster, Grant Malcolm
118
Voted
IPPS
2007
IEEE
15 years 7 months ago
Predictive Resource Scheduling in Computational Grids
The integration of clusters of computers into computational grids has recently gained the attention of many computational scientists. While considerable progress has been made in ...
Clovis Chapman, Mirco Musolesi, Wolfgang Emmerich,...
CANDC
2005
ACM
15 years 2 months ago
The summer 1968 in London and Zagreb: starting or end point for computer art?
The Exhibition Cybernetic Serendipity (London 1968) is often considered to be the first major exhibition of computer art. Nearly forgotten, is an exhibition in Zagreb that also to...
Christoph Klütsch