Sciweavers

520 search results - page 96 / 104
» On the discovery of process models from their instances
Sort
View
LISA
2007
13 years 9 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
MOBIQUITOUS
2008
IEEE
14 years 1 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea
JOCN
2010
96views more  JOCN 2010»
13 years 5 months ago
Medial Temporal Lobe Activity during Source Retrieval Reflects Information Type, not Memory Strength
■ The medial temporal lobes (MTLs) are critical for episodic memory but the functions of MTL subregions are controversial. According to memory strength theory, MTL subregions co...
Rachel A. Diana, Andrew P. Yonelinas, Charan Ranga...
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
13 years 8 months ago
Managing team-based problem solving with symbiotic bid-based genetic programming
Bid-based Genetic Programming (GP) provides an elegant mechanism for facilitating cooperative problem decomposition without an a priori specification of the number of team member...
Peter Lichodzijewski, Malcolm I. Heywood
WWW
2003
ACM
14 years 8 months ago
A Unified Abstraction for Messaging on the Semantic Web
d Abstraction for Messaging on the Semantic Web Dennis Quan IBM Internet Technology 1 Rogers Street Cambridge, MA 02142 USA dennisq@us.ibm.com Karun Bakshi MIT Artificial Intellige...
Dennis Quan, Karun Bakshi, David R. Karger