Sciweavers

1663 search results - page 161 / 333
» Computer Security in the Real World
Sort
View
ASC
2007
15 years 4 months ago
Development of a soft computing-based framework for engineering design optimisation with quantitative and qualitative search spa
Most real world engineering design optimisation approaches reported in the literature aim to find the best set of solutions using computationally expensive quantitative (QT ) mode...
Victor Oduguwa, Rajkumar Roy, Didier Farrugia
IEEEMM
2006
97views more  IEEEMM 2006»
15 years 3 months ago
Ubiquitous Experience Media
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
Kenji Mase, Yasuyuki Sumi, Tomoji Toriyama, Megumu...
JSAC
2006
147views more  JSAC 2006»
15 years 3 months ago
Smart pay access control via incentive alignment
We use game theorectic models to show the lack of incentives in the TCP congestion avoidance algorithm and the consequential systemwide network problems. We then propose a Vickery-...
Jun Shu, Pravin Varaiya
JMLR
2007
58views more  JMLR 2007»
15 years 3 months ago
Distances between Data Sets Based on Summary Statistics
The concepts of similarity and distance are crucial in data mining. We consider the problem of defining the distance between two data sets by comparing summary statistics compute...
Nikolaj Tatti
KSEM
2010
Springer
15 years 2 months ago
Towards Scalable Instance Retrieval over Ontologies
In this paper, we consider the problem of query answering over large multimedia ontologies. Traditional reasoning systems may have problems to deal with large amounts of expressive...
Alissa Kaplunova, Ralf Möller, Sebastian Wand...