Sciweavers

1663 search results - page 73 / 333
» Computer Security in the Real World
Sort
View
FLAIRS
2001
13 years 10 months ago
A Computational Model for Portfolios of Cooperative Heterogeneous Algorithms for Discrete Optimization
Discrete optimization problemsarise throughout many real world domainsincluding planning, decision making, and search. NP-hardin general, these problems require novel approachesto...
Eugene Santos Jr.
ITSSA
2006
91views more  ITSSA 2006»
13 years 8 months ago
Organization Detection Using Emergent Computing
: Organization is a central concept in systems. In this paper an ant algorithm for detecting organizations is presented. In a discrete-time context, at each time-step, an organizat...
Cyrille Bertelle, Antoine Dutot, Fréd&eacut...
PRESENCE
2010
130views more  PRESENCE 2010»
13 years 7 months ago
Using a P300 Brain-Computer Interface in an Immersive Virtual Environment
Brain-computer interfaces (BCIs) provide a novel form of human-computer interaction. The purpose of these systems is to aid disabled people by aording them the possibility of com...
Michael Donnerer, Anthony Steed
OOPSLA
2010
Springer
13 years 7 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
ISI
2005
Springer
14 years 2 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang