Sciweavers

1094 search results - page 166 / 219
» On Computing Explanations in Argumentation
Sort
View
SAC
2009
ACM
14 years 4 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
ICNS
2009
IEEE
14 years 4 months ago
Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture
Some initiatives towards Future Internet, e.g., GENI, DARPA’s Active Networks, argue the need for programmability of the network components. Some other initiatives extend this w...
Vagan Y. Terziyan, Dmytro Zhovtobryukh, Artem Kata...
ICIC
2009
Springer
14 years 4 months ago
Function Sequence Genetic Programming
Genetic Programming(GP) can obtain a program structure to solve complex problem. This paper presents a new form of Genetic Programming, Function Sequence Genetic Programming (FSGP)...
Shixian Wang, Yuehui Chen, Peng Wu
PPDP
2009
Springer
14 years 4 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
DSN
2008
IEEE
14 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...