Sciweavers

1860 search results - page 328 / 372
» Structured Multimedia Authoring
Sort
View
USS
2008
15 years 21 hour ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
DIMVA
2010
14 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
NIPS
1989
14 years 11 months ago
The Cascade-Correlation Learning Architecture
Cascade-Correlation is a new architecture and supervised learning algorithm for artificial neural networks. Instead of just adjusting the weights in a network of fixed topology,...
Scott E. Fahlman, Christian Lebiere
USENIX
1990
14 years 11 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
14 years 10 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...