Sciweavers

1663 search results - page 75 / 333
» Computer Security in the Real World
Sort
View
ICCS
2007
Springer
14 years 3 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
ESORICS
2002
Springer
14 years 8 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
IJLT
2010
115views more  IJLT 2010»
13 years 7 months ago
Computer supported ubiquitous learning environment for vocabulary learning
: Ubiquitous computing could help the organisation and the mediation of social interactions wherever and whenever these situations might occur. Using those technologies enables the...
Hiroaki Ogata, Chengjiu Yin, Moushir M. El-Bishout...
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
14 years 2 months ago
Evolving analog controllers for correcting thermoacoustic instability in real hardware
Previous research demonstrated that Evolvable Hardware (EH) techniques can be employed to suppress Thermoacoustic (TA) instability in a computer simulated combustion chamber. Thou...
Saranyan Vigraham, John C. Gallagher, Sanjay K. Bo...
IJHPCA
2006
99views more  IJHPCA 2006»
13 years 8 months ago
A Pragmatic Analysis Of Scheduling Environments On New Computing Platforms
Today, large scale parallel systems are available at relatively low cost. Many powerful such systems have been installed all over the world and the number of users is always incre...
Lionel Eyraud