Sciweavers

2002 search results - page 349 / 401
» Interactive technical illustration
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
13 years 8 months ago
Avida-MDE: a digital evolution approach to generating models of adaptive software behavior
Increasingly, high-assurance applications rely on autonomic systems to respond to changes in their environment. The inherent uncertainty present in the environment of autonomic sy...
Heather Goldsby, Betty H. C. Cheng
ICFP
2010
ACM
13 years 7 months ago
Lolliproc: to concurrency from classical linear logic via curry-howard and control
While many type systems based on the intuitionistic fragment of linear logic have been proposed, applications in programming languages of the full power of linear logic--including...
Karl Mazurak, Steve Zdancewic
WWW
2010
ACM
13 years 7 months ago
Implementing the media fragments URI specification
In this paper, we describe two examples of implementations of the Media Fragments URI specification which is currently being developed by the W3C Media Fragments Working Group. Th...
Davy Van Deursen, Raphaël Troncy, Erik Mannen...
ACTA
2007
126views more  ACTA 2007»
13 years 7 months ago
The syntactic monoid of hairpin-free languages
The study of hairpin-free words has been initiated in the context of DNA computing. DNA strands that, theoretically speaking, are finite strings over the alphabet {A, G, C, T} are...
Lila Kari, Kalpana Mahalingam, Gabriel Thierrin