Sciweavers

1090 search results - page 98 / 218
» Case Study: Componentization of an Industrial Control System
Sort
View
CCS
2006
ACM
14 years 27 days ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ATAL
2006
Springer
14 years 27 days ago
Evolutionary Optimization of ZIP60: A Controlled Explosion in Hyperspace
The "ZIP" adaptive trading algorithm has been demonstrated to outperform human traders in experimental studies of continuous double auction (CDA) markets. The original Z...
Dave Cliff
RTSS
2006
IEEE
14 years 3 months ago
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals
In this paper, we study temperature-constrained hard realtime systems, where real-time guarantees must be met without exceeding safe temperature levels within the processor. Dynam...
Shengquan Wang, Riccardo Bettati
CCS
2009
ACM
14 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
GECCO
2006
Springer
195views Optimization» more  GECCO 2006»
14 years 24 days ago
Studying XCS/BOA learning in Boolean functions: structure encoding and random Boolean functions
Recently, studies with the XCS classifier system on Boolean functions have shown that in certain types of functions simple crossover operators can lead to disruption and, conseque...
Martin V. Butz, Martin Pelikan