Sciweavers

451 search results - page 44 / 91
» P Systems and Topology: Some Suggestions for Research
Sort
View
IJCAI
1989
13 years 8 months ago
Neuroplanners and Their Application to Eyes/Head/Neck Coordination
We review a neuroplanner architecture for use in constructing subcognitive controllers and new application that uses it. These controllers have wo important properties: (1) the ab...
Daryl H. Graf, Wilf R. LaLonde
EUROSYS
2006
ACM
14 years 4 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
ICCS
2009
Springer
14 years 7 days ago
GRID Resource Searching on the GridSim Simulator
Nowadays, the Grid is the focus of multiple researches. Our work is centered on Resource Management for Grids as it is an opened and current research area. Decentralized, scalable ...
Antonia Gallardo, Luis Díaz de Cerio, Roc M...
USS
2008
13 years 10 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...