In this paper we present an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environm...
Large-scale systems for information extraction include many different classifiers and extractors. Experience in building such systems shows that finding an appropriate architect...
Abstract- Behavior based architectures have many parameters that must be tuned to produce effective and believable agents. We use genetic algorithms to tune simple behavior based c...
Ryan E. Leigh, Tony Morelli, Sushil J. Louis, Moni...
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...