Sciweavers

231 search results - page 44 / 47
» Testing Exchangeability On-Line
Sort
View
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
14 years 1 months ago
Combining competent crossover and mutation operators: a probabilistic model building approach
This paper presents an approach to combine competent crossover and mutation operators via probabilistic model building. Both operators are based on the probabilistic model buildin...
Cláudio F. Lima, Kumara Sastry, David E. Go...
ICDAR
2003
IEEE
14 years 23 days ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
ICRA
2003
IEEE
126views Robotics» more  ICRA 2003»
14 years 23 days ago
Experimental analysis of an innovative prosthetic hand with proprioceptive sensors
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
WWW
2003
ACM
14 years 22 days ago
Experience With Teaching and Learning in Cooperative Knowledge Areas
Since the early 1990s, different infrastructures for supporting learning have been developed and practically tested in Paderborn. One of the key products of our research is the we...
Thorsten Hampel, Reinhard Keil-Slawik