Sciweavers

3555 search results - page 509 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
176
Voted
CIKM
2006
Springer
15 years 9 months ago
Incorporating query difference for learning retrieval functions in world wide web search
We discuss information retrieval methods that aim at serving a diverse stream of user queries such as those submitted to commercial search engines. We propose methods that emphasi...
Hongyuan Zha, Zhaohui Zheng, Haoying Fu, Gordon Su...
GECCO
2009
Springer
101views Optimization» more  GECCO 2009»
15 years 12 months ago
Modeling UCS as a mixture of experts
We present a probabilistic formulation of UCS (a sUpervised Classifier System). UCS is shown to be a special case of mixture of experts where the experts are learned independentl...
Narayanan Unny Edakunni, Tim Kovacs, Gavin Brown, ...
153
Voted
ISORC
2002
IEEE
15 years 10 months ago
Packaging Quality of Service Control Behaviors for Reuse
Two limitations of the current implementations of adaptive QoS behaviors are complexity associated with inserting them into common application contexts and lack of reusability acr...
Richard E. Schantz, Joseph P. Loyall, Michael Atig...
DSN
2008
IEEE
15 years 12 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
CASES
2005
ACM
15 years 7 months ago
Energy management for commodity short-bit-width microcontrollers
Dynamic frequency scaling and dynamic voltage scaling have been developed to save power and/or energy for general purpose computing platforms and high-end embedded systems. This p...
Rony Ghattas, Alexander G. Dean