Sciweavers

455 search results - page 75 / 91
» Tradeoffs for Packet Classification
Sort
View
105
Voted
UIST
2009
ACM
15 years 9 months ago
Enabling always-available input with muscle-computer interfaces
Previous work has demonstrated the viability of applying offline analysis to interpret forearm electromyography (EMG) and classify finger gestures on a physical surface. We extend...
T. Scott Saponas, Desney S. Tan, Dan Morris, Ravin...
105
Voted
IAT
2007
IEEE
15 years 8 months ago
Negotiation Dynamics: Analysis, Concession Tactics, and Outcomes
Given that a negotiation outcome is determined to a large extent by the successive offers exchanged by negotiating agents, it is useful to analyze dynamic patterns of the bidding,...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
119
Voted
ICANNGA
2007
Springer
149views Algorithms» more  ICANNGA 2007»
15 years 8 months ago
Using Real-Valued Meta Classifiers to Integrate and Contextualize Binding Site Predictions
Currently the best algorithms for transcription factor binding site predictions are severely limited in accuracy. However, a non-linear combination of these algorithms could improv...
Mark Robinson, Offer Sharabi, Yi Sun, Rod Adams, R...
ICARIS
2007
Springer
15 years 8 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
COOPIS
2002
IEEE
15 years 7 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov