Sciweavers

1095 search results - page 182 / 219
» Recurrent neural network based language model
Sort
View
POLICY
2007
Springer
15 years 6 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
GSEM
2004
Springer
15 years 5 months ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...
SBRN
2006
IEEE
15 years 5 months ago
Evolutionary Algorithm for 3D Object Reconstruction from Images
This work presents an evolutionary algorithm to reconstruct 3D objects based on images of them. In the proposed evolutionary algorithm, we describe a way to evolve 3D initial mode...
Renata L. M. E. do Rego, Hansenclever de F. Bassan...
ICANN
2005
Springer
15 years 5 months ago
Varying the Population Size of Artificial Foraging Swarms on Time Varying Landscapes
Abstract. Swarm Intelligence (SI) is the property of a system whereby the collective behaviors of (unsophisticated) entities interacting locally with their environment cause cohere...
Carlos Fernandes, Vitorino Ramos, Agostinho C. Ros...
ICRA
1994
IEEE
100views Robotics» more  ICRA 1994»
15 years 3 months ago
SM2 for New Space Station Structure: Autonomous Locomotion and Teleoperation Control
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
Michael C. Nechyba, Yangsheng Xu