Sciweavers

3206 search results - page 530 / 642
» How minds can be computational systems
Sort
View
WWW
2008
ACM
16 years 5 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
220
Voted
MOBIHOC
2002
ACM
16 years 4 months ago
Minimum energy paths for reliable communication in multi-hop wireless networks
Current algorithms for minimum-energy routing in wireless networks typically select minimum-cost multi-hop paths. In scenarios where the transmission power is fixed, each link has...
Suman Banerjee, Archan Misra
DEBS
2007
ACM
15 years 8 months ago
Modeling the communication costs of content-based routing: the case of subscription forwarding
Content-based routing (CBR) provides the core distribution support of several middleware paradigms, most notably content-based publish-subscribe. Despite its popularity, however, ...
Stefano Castelli, Paolo Costa, Gian Pietro Picco
134
Voted
BMCBI
2008
150views more  BMCBI 2008»
15 years 4 months ago
Natural Language Processing in aid of FlyBase curators
Background: Despite increasing interest in applying Natural Language Processing (NLP) to biomedical text, whether this technology can facilitate tasks such as database curation re...
Nikiforos Karamanis, Ruth Seal, Ian Lewin, Peter M...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens