Sciweavers

1588 search results - page 280 / 318
» The Intelligence Within
Sort
View
DRM
2006
Springer
14 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ESAW
2006
Springer
14 years 1 months ago
Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols
Abstract. Current approaches to multi-agent interaction involve specifying protocols as sets of possible interactions, and hard-coding decision mechanisms into agent programs in or...
Tim Miller, Peter McBurney
GECCO
2006
Springer
140views Optimization» more  GECCO 2006»
14 years 1 months ago
A representational ecology for learning classifier systems
The representation used by a learning algorithm introduces a bias which is more or less well-suited to any given learning problem. It is well known that, across all possible probl...
James A. R. Marshall, Tim Kovacs
ITS
2000
Springer
159views Multimedia» more  ITS 2000»
14 years 1 months ago
Can We Learn from ITSs?
With the rise of VR, the internet, and mobile technologies and the shifts in educational focus from teaching to learning and from solitary to collaborative work, it's easy (bu...
Benedict du Boulay
MICAI
2000
Springer
14 years 1 months ago
Eigenfaces Versus Eigeneyes: First Steps Toward Performance Assessment of Representations for Face Recognition
The Principal Components Analysis (PCA) is one of the most successfull techniques that have been used to recognize faces in images. This technique consists of extracting the eigenv...
Teófilo Emídio de Campos, Rogé...