Sciweavers

2335 search results - page 375 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
JMLR
2010
128views more  JMLR 2010»
14 years 8 months ago
Fluid Dynamics Models for Low Rank Discriminant Analysis
We consider the problem of reducing the dimensionality of labeled data for classification. Unfortunately, the optimal approach of finding the low-dimensional projection with minim...
Yung-Kyun Noh, Byoung-Tak Zhang, Daniel D. Lee
AGENTS
1997
Springer
15 years 5 months ago
Synthetic Minds
This paper discusses conditions under which some of the “higher level” mental concepts applicable to human beings might also be applicable to artificial agents. The key idea ...
Aaron Sloman
CCS
2005
ACM
15 years 7 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
VIP
2003
15 years 3 months ago
Web-based Multimedia GP Medical System
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Chee Chern Lim, Man Hing Yu, Jesse J. Jin
JSW
2007
185views more  JSW 2007»
15 years 1 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...