Sciweavers

1998 search results - page 319 / 400
» Situated Control Rules
Sort
View
FC
2010
Springer
145views Cryptology» more  FC 2010»
15 years 2 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
IV
2010
IEEE
150views Visualization» more  IV 2010»
15 years 2 months ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
GLOBECOM
2010
IEEE
15 years 2 months ago
A Tunnel-Aware Language for Network Packet Filtering
While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately...
Luigi Ciminiera, Marco Leogrande, Ju Liu, Fulvio R...
SEMWEB
2010
Springer
15 years 2 months ago
Forgetting Fragments from Evolving Ontologies
Abstract. Ontologies underpin the semantic web; they define the concepts and their relationships contained in a data source. An increasing number of ontologies are available on-lin...
Heather S. Packer, Nicholas Gibbins, Nicholas R. J...
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 2 months ago
Genetic programming for quantitative stock selection
We provide an overview of using genetic programming (GP) to model stock returns. Our models employ GP terminals (model decision variables) that are financial factors identified by...
Ying L. Becker, Una-May O'Reilly