Sciweavers

CORR
2010
Springer
352views Education» more  CORR 2010»
13 years 7 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 7 months ago
Breaking the Legend: Maxmin Fairness notion is no longer effective
In this paper we analytically propose an alternative approach to achieve better fairness in scheduling mechanisms which could provide better quality of service particularly for re...
Yaser Miaji, Suhaidi Hassan
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 7 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 7 months ago
Towards Adaptable and Adaptive Policy-Free Middleware
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independ...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 7 months ago
Extended Computation Tree Logic
We introduce a generic extension of the popular branching-time logic CTL which refines the temporal until and release operators with formal languages. For instance, a language may ...
Roland Axelsson, Matthew Hague, Stephan Kreutzer, ...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 7 months ago
Segmentation of Natural Images by Texture and Boundary Compression
Hossein Mobahi, Shankar Rao, Allen Y. Yang, Shanka...
CORR
2010
Springer
41views Education» more  CORR 2010»
13 years 7 months ago
Functional Answer Set Programming
Pedro Cabalar
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 7 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
Modelling Reactive and Proactive Behaviour in Simulation
: This research investigated the simulation model behaviour of a traditional and combined discrete event as well as agent based simulation models when modelling human reactive and ...
Mazlina Abdul Majid, Peer-Olaf Siebers, Uwe Aickel...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 7 months ago
The Use of Probabilistic Systems to Mimic the Behaviour of Idiotypic AIS Robot Controllers
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...