Sciweavers

4052 search results - page 674 / 811
» Using RDF to describe networks
Sort
View
ECAL
2007
Springer
15 years 11 months ago
New Models for Old Questions: Evolutionary Robotics and the 'A Not B' Error
Abstract. In psychology the ‘A not B’ error, whereby infants perseverate in reaching to the location where a toy was previously hidden after it has been moved to a new location...
Rachel Wood, Ezequiel A. Di Paolo
140
Voted
ESORICS
2007
Springer
15 years 11 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICIC
2007
Springer
15 years 11 months ago
Evolutionary Ensemble for In Silico Prediction of Ames Test Mutagenicity
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...
Huanhuan Chen, Xin Yao
163
Voted
DFT
2006
IEEE
143views VLSI» more  DFT 2006»
15 years 11 months ago
Defect Tolerant and Energy Economized DSP Plane of a 3-D Heterogeneous SoC
This paper1 discusses a defect tolerant and energy economized computing array for the DSP plane of a 3-D Heterogeneous System on a Chip. We present the J-platform, which employs c...
Vijay K. Jain, Glenn H. Chapman
ICAC
2006
IEEE
15 years 11 months ago
Utility-aware Resource Allocation in an Event Processing System
— Event processing systems link event producers and consumers in a flexible manner, by supporting multiple communication patterns and powerful message transformations. Such syst...
Sumeer Bhola, Mark Astley, Robert Saccone, Michael...