Sciweavers

6308 search results - page 1114 / 1262
» Modeling Urgency in Timed Systems
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 9 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
176
Voted
PPSN
1994
Springer
15 years 8 months ago
Genetic L-System Programming
We present the Genetic L-System Programming (GLP) paradigm for evolutionary creation and development of parallel rewrite systems (Lsystems, Lindenmayer-systems) which provide a com...
Christian Jacob
157
Voted
FTDCS
2004
IEEE
15 years 8 months ago
The vMatrix: Server Switching
Today most Internet services are pre-assigned to servers statically, hence preventing us from doing real-time sharing of a pool of servers across as group of services with dynamic...
Amr Awadallah, Mendel Rosenblum
AAAI
1994
15 years 5 months ago
Corpus-Driven Knowledge Acquisition for Discourse Analysis
The availability of large on-line text corpora provides a natural and promising bridge between the worlds of natural language processing (NLP) and machine learning (ML). In recent...
Stephen Soderland, Wendy G. Lehnert
ATAL
2010
Springer
15 years 5 months ago
Establishing spatially targeted communication in a heterogeneous robot swarm
We consider a heterogeneous swarm consisting of aerial and wheeled robots. We present a system that enables spatially targeted communication. Our system enables aerial robots to e...
Nithin Mathews, Anders Lyhne Christensen, Eliseo F...
« Prev « First page 1114 / 1262 Last » Next »