Sciweavers

1986 search results - page 309 / 398
» An activity based costing approach to systems development an...
Sort
View
MMMACNS
2005
Springer
14 years 3 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
CSREASAM
2006
13 years 11 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
AROBOTS
2007
129views more  AROBOTS 2007»
13 years 10 months ago
Behaviors for physical cooperation between robots for mobility improvement
— A team of small, low-cost robots instead of a single large, complex robot is useful in operations such as search and rescue, urban exploration etc. However, the performance of ...
Ashish Deshpande, Jonathan E. Luntz
BMCBI
2007
105views more  BMCBI 2007»
13 years 10 months ago
VaxiJen: a server for prediction of protective antigens, tumour antigens and subunit vaccines
Background: Vaccine development in the post-genomic era often begins with the in silico screening of genome information, with the most probable protective antigens being predicted...
Irini A. Doytchinova, Darren R. Flower
AI
2000
Springer
13 years 10 months ago
Proving theorems by reuse
We investigate the improvement of theorem proving by reusing previously computed proofs. We have developed and implemented the PLAGIATOR system which proves theorems by mathematic...
Christoph Walther, Thomas Kolbe