Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
This article, assuming that player motivations are the outcome of continuous player-environment interactions, applies the needs framework of Murray (1938) to a computer game and i...
— This paper presents a promising architecture for of the 3GPP’s IMS for supporting real-time session negotiation converging third-generation (3G) cellular data networks and an...
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
We describe a new algorithm for protein classi cation and the detection of remote homologs. The rationale is to exploit both vertical and horizontal information of a multiple alig...