Sciweavers

2335 search results - page 382 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
105
Voted
SIGIR
2002
ACM
15 years 1 months ago
Detecting and Browsing Events in Unstructured text
Previews and overviews of large, heterogeneous information resources help users comprehend the scope of collections and focus on particular subsets of interest. For narrative docu...
David A. Smith
MOBISYS
2008
ACM
16 years 1 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
115
Voted
VRML
1999
ACM
15 years 6 months ago
Avatars in LivingSpace
We describe how we implemented the avatars we use to represent users in LivingSpace, our implementation of the Living Worlds standard for multi-user distributed VRML worlds. Livin...
Mike Wray, Vincent Belrose
ICDCN
2010
Springer
15 years 8 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
113
Voted
GECCO
2006
Springer
185views Optimization» more  GECCO 2006»
15 years 5 months ago
Memory analysis and significance test for agent behaviours
Many agent problems in a grid world have a restricted sensory information and motor actions. The environmental conditions need dynamic processing of internal memory. In this paper...
DaeEun Kim