Sciweavers

1532 search results - page 230 / 307
» An analysis of additivity in OLAP systems
Sort
View
CCS
2010
ACM
14 years 5 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
AINA
2009
IEEE
14 years 5 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
GECCO
2009
Springer
305views Optimization» more  GECCO 2009»
14 years 4 months ago
Evolving competitive car controllers for racing games with neuroevolution
Modern computer games are at the same time an attractive application domain and an interesting testbed for the evolutionary computation techniques. In this paper we apply NeuroEvo...
Luigi Cardamone, Daniele Loiacono, Pier Luca Lanzi
ICCS
2009
Springer
14 years 4 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ICIAR
2009
Springer
14 years 4 months ago
Video Compression and Retrieval of Moving Object Location Applied to Surveillance
Abstract. A major problem in surveillance systems is the storage requirements for video archival; videos are recorded continuously for long periods of time, resulting in large amou...
William Robson Schwartz, Hélio Pedrini, Lar...