Sciweavers

3104 search results - page 528 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
141
Voted
ISSA
2004
15 years 5 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
AI
2005
Springer
15 years 3 months ago
Semiotic schemas: A framework for grounding language in action and perception
A theoretical framework for grounding language is introduced that provides a computational path from sensing and motor action to words and speech acts. The approach combines conce...
Deb Roy
CCS
2010
ACM
15 years 1 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
BMCBI
2010
149views more  BMCBI 2010»
15 years 3 months ago
RuleMonkey: software for stochastic simulation of rule-based models
Background: The system-level dynamics of many molecular interactions, particularly protein-protein interactions, can be conveniently represented using reaction rules, which can be...
Joshua Colvin, Michael I. Monine, Ryan N. Gutenkun...
ACMSE
2006
ACM
15 years 5 months ago
Tic-Tac-LEGO: an investigation into coordinated robotic control
The Lego Mindstorms Robot Command eXplorer (RCX) is a popular robotics kit that provides an immediate "out-of-the-box" opportunity to explore software controlled robot i...
Ruben Vuittonet, Jeff Gray