Sciweavers

10899 search results - page 1885 / 2180
» The GP Programming System
Sort
View
111
Voted
NSPW
2003
ACM
15 years 8 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
132
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham
151
Voted
AC
2003
Springer
15 years 8 months ago
WAIF: Web of Asynchronous Information Filters
WAIF is a new framework to facilitate easy user access for Internet users to relevant news items. WAIF supports new kinds of browsers, personalized filters, recommendation systems...
Dag Johansen, Robbert van Renesse, Fred B. Schneid...
114
Voted
ATAL
2003
Springer
15 years 8 months ago
MONAD: a flexible architecture for multi-agent control
Research in multi-agent systems has led to the development of many multi-agent control architectures. However, we believe that there is currently no known optimal structure for mu...
Thuc Vu, Jared Go, Gal A. Kaminka, Manuela M. Velo...
124
Voted
CP
2003
Springer
15 years 8 months ago
Open Constraint Optimization
Constraint satisfaction has been applied with great success in closed-world scenarios, where all options and constraints are known from the beginning and fixed. With the internet,...
Boi Faltings, Santiago Macho-Gonzalez
« Prev « First page 1885 / 2180 Last » Next »