Sciweavers

CORR
2008
Springer
150views Education» more  CORR 2008»
14 years 17 days ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
CORR
2008
Springer
86views Education» more  CORR 2008»
14 years 17 days ago
Twenty-Five Moves Suffice for Rubik's Cube
How many moves does it take to solve Rubik's Cube? Positions are known that require 20 moves, and it has already been shown that there are no positions that require 27 or mor...
Tomas Rokicki
CORR
2008
Springer
76views Education» more  CORR 2008»
14 years 17 days ago
Facing the Facts
Patrick O'Beirne
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 17 days ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
CORR
2008
Springer
99views Education» more  CORR 2008»
14 years 17 days ago
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
Michael Hahsler
CORR
2008
Springer
60views Education» more  CORR 2008»
14 years 17 days ago
The Role of Management Practices in Closing the Productivity Gap
Peer-Olaf Siebers, Uwe Aickelin, Giuliana Battisti...
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 17 days ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2008
Springer
81views Education» more  CORR 2008»
14 years 17 days ago
Rule Generalisation in Intrusion Detection Systems using Snort
Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Rober...
CORR
2008
Springer
104views Education» more  CORR 2008»
14 years 17 days ago
A Recommender System based on Idiotypic Artificial Immune Networks
Abstract-The immune system is a complex biological system with a highly distributed, adaptive and selforganising nature. This paper presents an Artificial Immune System (AIS) that ...
Steve Cayzer, Uwe Aickelin
CORR
2008
Springer
95views Education» more  CORR 2008»
14 years 17 days ago
An Indirect Genetic Algorithm for a Nurse Scheduling Problem
This paper describes a Genetic Algorithms approach to a manpower-scheduling problem arising at a major UK hospital. Although Genetic Algorithms have been successfully used for sim...
Uwe Aickelin, Kathryn A. Dowsland