Sciweavers

4231 search results - page 664 / 847
» Using Language More Responsibly
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
151
Voted
ICAC
2008
IEEE
15 years 10 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
146
Voted
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 10 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
VTC
2007
IEEE
108views Communications» more  VTC 2007»
15 years 10 months ago
Multiuser MIMO: Principle, Performance in Measured Channels and Applicable Service
—The exploitation of multiuser diversity and the application of multiple antennas at transmitter and receiver are considered to be key technologies for future highly bandwidtheff...
Gerhard Bauch, Pedro Tejera, Christian Guthy, Wolf...
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
15 years 10 months ago
Evolutionary benefits of evolvable component integration
A system composed of multiple interacting components is capable of responding to contextual information and producing a higher range of non-linear responses to stimuli compared to...
David Malkin, R. Beau Lotto