Sciweavers

1663 search results - page 83 / 333
» Computer Security in the Real World
Sort
View
AAAI
1998
13 years 10 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
SAC
2011
ACM
12 years 11 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
IPPS
2008
IEEE
14 years 3 months ago
A study of master-slave approaches to parallelize NSGA-II
Many of the optimization problems from the real world are multiobjective in nature, and the reference algorithm for multiobjective optimization is NSGA-II. Frequently, these probl...
Juan José Durillo, Antonio J. Nebro, Franci...
WAPCV
2007
Springer
14 years 3 months ago
Reinforcement Learning for Decision Making in Sequential Visual Attention
The innovation of this work is the provision of a system that learns visual encodings of attention patterns and that enables sequential attention for object detection in real world...
Lucas Paletta, Gerald Fritz
PAM
2005
Springer
14 years 2 months ago
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
In this paper we present results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths...
Alok Shriram, Margaret Murray, Young Hyun, Nevil B...