Sciweavers

1663 search results - page 92 / 333
» Computer Security in the Real World
Sort
View
AP2PC
2004
Springer
14 years 2 months ago
On Exploiting Agent Technology in the Design of Peer-to-Peer Applications
Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of ap...
Steven Willmott, Josep M. Pujol, Ulises Cort&eacut...
FSKD
2006
Springer
122views Fuzzy Logic» more  FSKD 2006»
14 years 17 days ago
Context Modeling with Bayesian Network Ensemble for Recognizing Objects in Uncertain Environments
Abstract. It is difficult to understand a scene from visual information in uncertain real world. Since Bayesian network (BN) is known as good in this uncertainty, it has received s...
Seung-Bin Im, Youn-Suk Song, Sung-Bae Cho
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
14 years 17 days ago
The no free lunch and realistic search algorithms
The No-Free-Lunch theorems (NFLTs) are criticized for being too general to be of any relevance to the real world scenario. This paper investigates, both formally and empirically, ...
Yossi Borenstein, Riccardo Poli
ICONIP
2004
13 years 10 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
COLING
2002
13 years 8 months ago
Extending a Broad-Coverage Parser for a General NLP Toolkit
With the rapid growth of real world applications for NLP systems, there is a genuine demand for a general toolkit from which programmers with no linguistic knowledge can build spe...
Hassan Alam, Hua Cheng, Rachmat Hartono, Aman Kuma...