Sciweavers

1396 search results - page 268 / 280
» A Tale of Two Futures
Sort
View
AAMAS
2005
Springer
13 years 8 months ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 8 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
IJON
2007
82views more  IJON 2007»
13 years 8 months ago
Inhibitory conductance dynamics in cortical neurons during activated states
During activated states in vivo, neocortical neurons are subject to intense synaptic activity and high-amplitude membrane potential ðVmÞ fluctuations. These ‘‘high-conducta...
Martin Pospischil, Zuzanna Piwkowska, Michelle Rud...
TASE
2008
IEEE
13 years 8 months ago
New Solution Approaches to the General Single- Machine Earliness-Tardiness Problem
This paper addresses the general single-machine earliness-tardiness problem with distinct release dates, due dates, and unit costs. The aim of this research is to obtain an exact n...
Hoksung Yau, Yunpeng Pan, Leyuan Shi
ASE
2005
137views more  ASE 2005»
13 years 8 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund