Sciweavers

214 search results - page 14 / 43
» Digital Secure-Communication Using Robust Hyper-Chaotic Syst...
Sort
View
JCDL
2005
ACM
175views Education» more  JCDL 2005»
14 years 1 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
SOSP
2005
ACM
14 years 4 months ago
Mondrix: memory isolation for linux using mondriaan memory protection
This paper presents the design and an evaluation of Mondrix, a version of the Linux kernel with Mondriaan Memory Protection (MMP). MMP is a combination of hardware and software th...
Emmett Witchel, Junghwan Rhee, Krste Asanovic
SASN
2003
ACM
14 years 26 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
GECCO
2006
Springer
180views Optimization» more  GECCO 2006»
13 years 11 months ago
Growth of self-canceling code in evolutionary systems
This research examines the behavior of inoperative code (introns) in the evolution of genetically robust solutions. Genetically robust solutions are solutions that are less likely...
Xue Zhong, Terence Soule
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
14 years 1 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst