Sciweavers

244 search results - page 33 / 49
» From Belief Change to Preference Change
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
14 years 1 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
IWSOC
2005
IEEE
121views Hardware» more  IWSOC 2005»
14 years 1 months ago
Open HW, Open Design SW, and the VC Ecosystem Dilemma
The open model for solutions development is quickly extending from software to other technology areas, such as hardware and services. Specifically, just as open source has spawned...
Juan Antonio Carballo
KR
2010
Springer
14 years 13 days ago
Diagnosis as Planning Revisited
In discrete dynamical systems change results from actions. As such, given a set of observations, diagnoses often take the form of posited events that result in the observed behavi...
Shirin Sohrabi, Jorge A. Baier, Sheila A. McIlrait...
ACISICIS
2010
IEEE
13 years 9 months ago
One-Finger Interaction for Ubiquitous Environment
We propose new interaction techniques named "One-finger Interaction" in the ubiquitous environment in a home. One-finger Interaction is an interaction technique for doing...
Takashi Nakamura, Shin Takahashi, Jiro Tanaka