Sciweavers

14824 search results - page 2918 / 2965
» Security - Introduction
Sort
View
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 1 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
143
Voted
ICFP
2010
ACM
15 years 22 days ago
A certified framework for compiling and executing garbage-collected languages
We describe the design, implementation, and use of a machinecertified framework for correct compilation and execution of programs in garbage-collected languages. Our framework ext...
Andrew McCreight, Tim Chevalier, Andrew P. Tolmach
MOBICOM
2010
ACM
15 years 22 days ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
121
Voted
MOBICOM
2010
ACM
15 years 22 days ago
Challenge: mobile optical networks through visual MIMO
Mobile optical communications has so far largely been limited to short ranges of about ten meters, since the highly directional nature of optical transmissions would require costl...
Ashwin Ashok, Marco Gruteser, Narayan Mandayam, Ja...
94
Voted
RECSYS
2010
ACM
15 years 22 days ago
Workshop on user-centric evaluation of recommender systems and their interfaces
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluat...
Bart P. Knijnenburg, Lars Schmidt-Thieme, Dirk G. ...
« Prev « First page 2918 / 2965 Last » Next »