By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Abstract-- Mobile Agents are a well-known programming paradigm nowadays. There is a multitude of research concerning Mobile Agent Systems with emphasize on agent coordination, agen...
Michael Friedrich, Kirsten Terfloth, Gerd Nusser, ...
In this paper we present a new tool called BeanWatcher that allows the semi-automatic generation of multimedia monitoring and management applications for wireless sensor networks. ...
Abstract. We investigate the evolutionary processes behind the development and optimization of multiple threads of execution in digital organisms using the avida platform, a softwa...
Charles Ofria, Christoph Adami, Travis C. Collier,...
"It / I" is a two-character theater play where the human character I (played by a real actor) is taunted and played with by an autonomous computer character It on a comp...