Sciweavers

18374 search results - page 3590 / 3675
» Applications for data hiding
Sort
View
COMSWARE
2006
IEEE
14 years 23 days ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
ECOOPW
2006
Springer
14 years 21 days ago
AOSD and Reflection: Benefits and Drawbacks to Software Evolution
Following last two years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE 2006 workshop was a successful and popular...
Walter Cazzola, Shigeru Chiba, Yvonne Coady, Gunte...
FINTAL
2006
14 years 21 days ago
Coordination Structures in a Typed Feature Structure Grammar: Formalization and Implementation
Abstract. Every language employs its own coordination strategies, according to the type of coordinating marking, the pattern of marking, the position of the marker, and the phrase ...
Jong-Bok Kim, Jaehyung Yang
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
14 years 21 days ago
Evolutionary learning with kernels: a generic solution for large margin problems
In this paper we embed evolutionary computation into statistical learning theory. First, we outline the connection between large margin optimization and statistical learning and s...
Ingo Mierswa
ACSAC
2003
IEEE
14 years 21 days ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
« Prev « First page 3590 / 3675 Last » Next »