Sciweavers

8658 search results - page 1545 / 1732
» Models of Command and Control
Sort
View
GECCO
2006
Springer
123views Optimization» more  GECCO 2006»
15 years 6 months ago
Fluctuating crosstalk, deterministic noise, and GA scalability
This paper extends previous work showing how fluctuating crosstalk in a deterministic fitness function introduces noise into genetic algorithms. In that work, we modeled fluctuati...
Paul Winward, David E. Goldberg
103
Voted
ACSAC
2001
IEEE
15 years 6 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
125
Voted
CSFW
2010
IEEE
15 years 6 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
146
Voted
ECAI
2000
Springer
15 years 6 months ago
The WITAS Unmanned Aerial Vehicle Project
The purpose of this paper is to provide a broad overview of the WITAS Unmanned Aerial Vehicle Project. The WITAS UAV project is an ambitious, long-term basic research project with ...
Patrik Dohrty, Gösta H. Granlund, Krzysztof K...
120
Voted
ESOP
2000
Springer
15 years 6 months ago
Polyvariant Flow Analysis with Constrained Types
Abstract. The basic idea behind improving the quality of a monovariant control flow analysis such as 0CFA is the concept of polyvariant analyses such as Agesen's Cartesian Pro...
Scott F. Smith, Tiejun Wang
« Prev « First page 1545 / 1732 Last » Next »