Sciweavers

592 search results - page 44 / 119
» Competition, Cooperation, and Authorization
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 8 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
CHI
2009
ACM
14 years 8 months ago
Familial collaborations in a museum
Studies of interactive systems in museums have raised important design considerations, but so far have failed to address sufficiently the particularities of family interaction and...
Tom Hope, Yoshiyuki Nakamura, Toru Takahashi, Atsu...
IWSOS
2007
Springer
14 years 1 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
MM
2004
ACM
175views Multimedia» more  MM 2004»
14 years 1 months ago
A web based multi-display presentation system
In this demonstration, we are going to illustrate how to give a presentation using multiple displays connected to the Internet. Categories and Subject Descriptors H.4.3 [Communica...
Frank Zhao, Qiong Liu
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...