Sciweavers

388 search results - page 74 / 78
» Promoting the development of secure mobile agent application...
Sort
View
DFN
2003
13 years 8 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
14 years 1 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
AAAI
2008
13 years 9 months ago
A Fast Data Collection and Augmentation Procedure for Object Recognition
When building an application that requires object class recognition, having enough data to learn from is critical for good performance, and can easily determine the success or fai...
Benjamin Sapp, Ashutosh Saxena, Andrew Y. Ng
BMCBI
2007
187views more  BMCBI 2007»
13 years 7 months ago
BioWMS: a web-based Workflow Management System for bioinformatics
Background: An in-silico experiment can be naturally specified as a workflow of activities implementing, in a standardized environment, the process of data and control analysis. A...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
AMIRE
2005
Springer
198views Robotics» more  AMIRE 2005»
14 years 1 months ago
Extending the Temporal Horizon of Autonomous Robots
Abstract. We introduce mathematically rigorous metrics on agent experiences having various temporal horizons. Sensorimotor variables accessible to the agent are treated as informat...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Kerstin...