Sciweavers

1663 search results - page 71 / 333
» Computer Security in the Real World
Sort
View
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
14 years 3 months ago
Implementation issues for an interactive evolutionary computation system
The design and development of an Interactive Evolutionary Computation (IEC) system needs to take into account the implementation issues found when delivering the system to “Real...
Mark R. N. Shackelford
IPPS
2005
IEEE
14 years 2 months ago
Benchmarking the CLI for I/O-Intensive Computing
Common Language Infrastructure, or CLI, is a standardized virtual machine, which increasingly becomes popular on a wide range of platforms. In this paper we developed three I/O-in...
Xiao Qin, Tao Xie 0004, Ahalya Nathan, Vijaya K. T...
COBUILD
1998
Springer
14 years 1 months ago
Multiple-Computer User Interfaces: A Cooperative Environment Consisting of Multiple Digital Devices
Traditional graphical user interfaces (GUIs) are mainly designed for an environment consisting of a single display and a set of single input devices. However, in the near future we...
Jun Rekimoto
CASSIS
2004
Springer
14 years 2 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
PPSN
2004
Springer
14 years 2 months ago
Phase Transition Properties of Clustered Travelling Salesman Problem Instances Generated with Evolutionary Computation
Abstract. This paper introduces a generator that creates problem instances for the Euclidean symmetric travelling salesman problem. To fit real world problems, we look at maps con...
Jano I. van Hemert, Neil Urquhart