Sciweavers

9272 search results - page 1705 / 1855
» Process Management Agent
Sort
View
123
Voted
IPCCC
2007
IEEE
15 years 8 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
113
Voted
IPPS
2007
IEEE
15 years 8 months ago
A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...
Samee Ullah Khan, Ishfaq Ahmad
111
Voted
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
15 years 8 months ago
A developmental model of neural computation using cartesian genetic programming
The brain has long been seen as a powerful analogy from which novel computational techniques could be devised. However, most artificial neural network approaches have ignored the...
Gul Muhammad Khan, Julian F. Miller, David M. Hall...
118
Voted
IBPRIA
2007
Springer
15 years 8 months ago
On the Detection of Regions-of-Interest in Dynamic Contrast-Enhanced MRI
Multivariate imaging technologies such as Dynamic Contrast-Enhanced Magnetic Resonance Imaging (DCE-MRI) have recently gained an important attention as it improves tumour detection...
David Raba, Marta Peracaula, Robert Marti, Joan Ma...
143
Voted
TARK
2007
Springer
15 years 8 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
« Prev « First page 1705 / 1855 Last » Next »