Sciweavers

33 search results - page 5 / 7
» What Else Is There
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Information Survival Threshold in Sensor and P2P Networks
— Consider a network of, say, sensors, or P2P nodes, or bluetooth-enabled cell-phones, where nodes transmit information to each other and where links and nodes can go up or down....
Deepayan Chakrabarti, Jure Leskovec, Christos Falo...
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 8 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
IJCAI
1997
13 years 8 months ago
Change, Change, Change: Three Approaches
We consider the frame problem, that is, char­ acterizing the assumption that properties tend to persist over time. We show that there are at least three distinct assumptions that...
Tom Costello
DM
2010
90views more  DM 2010»
13 years 7 months ago
Knights, spies, games and ballot sequences
This paper solves the Knights and Spies Problem: In a room there are n people, each labelled with a unique number between 1 and n. A person may either be a knight or a spy. Knights...
Mark Wildon
WCRE
2003
IEEE
14 years 4 days ago
Reconstructing Software Architecture for J2EE Web Applications
In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture in...
Minmin Han, Christine Hofmeister, Robert L. Nord