Sciweavers

2795 search results - page 417 / 559
» Recommendations on recommendations
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 12 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
GECCO
2006
Springer
121views Optimization» more  GECCO 2006»
13 years 12 months ago
A splicing/decomposable encoding and its novel operators for genetic algorithms
In this paper, we introduce a new genetic representation -- a splicing/decomposable (S/D) binary encoding, which was proposed based on some theoretical guidance and existing recom...
Yong Liang, Kwong-Sak Leung, Kin-Hong Lee
ACSAC
2001
IEEE
13 years 12 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
ASWEC
2001
IEEE
13 years 12 months ago
Process Improvement in Four Small Software Companies
For many small software companies, full-scale software process improvement (SPI) initiatives are often out of reach due to prohibitive costs and lack of SPI knowledge. However, to...
Aileen Cater-Steel
ATAL
2003
Springer
13 years 12 months ago
Using web helper agent profiles in query generation
Personalized information agents can help overcome some of the limitations of communal Web information sources such as portals and search engines. Two important components of these...
Gabriel Somlo, Adele E. Howe