Sciweavers

1905 search results - page 306 / 381
» Conceptual Models and Architectures for Advanced Information...
Sort
View
SIGOPSE
1998
ACM
14 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
AAAI
2007
13 years 11 months ago
Predictive Exploration for Autonomous Science
Often remote investigations use autonomous agents to observe an environment on behalf of absent scientists. Predictive exploration improves these systems’ efficiency with onboa...
David R. Thompson
BIOSYSTEMS
2008
107views more  BIOSYSTEMS 2008»
13 years 9 months ago
The linearity of emergent spectro-temporal receptive fields in a model of auditory cortex
The responses of cortical neurons are often characterized by measuring their spectro-temporal receptive fields (strfs). The strf of a cell can be thought of as a representation of...
Martin Coath, Emili Balaguer-Ballester, Sue L. Den...
ICETE
2004
253views Business» more  ICETE 2004»
13 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong