Sciweavers

3095 search results - page 529 / 619
» Ubiquitous presence systems
Sort
View
CONEXT
2009
ACM
13 years 10 months ago
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement
The accuracy and speed of path capacity measurement could be seriously affected by the presence of cross traffic on the path. In this paper, we propose a new cross-traffic filteri...
Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang
GECCO
2008
Springer
133views Optimization» more  GECCO 2008»
13 years 10 months ago
Using feature-based fitness evaluation in symbolic regression with added noise
Symbolic regression is a popular genetic programming (GP) application. Typically, the fitness function for this task is based on a sum-of-errors, involving the values of the depe...
Janine H. Imada, Brian J. Ross
CAISE
2010
Springer
13 years 9 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
PODS
2010
ACM
197views Database» more  PODS 2010»
13 years 9 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
CCS
2010
ACM
13 years 9 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...