Sciweavers

65 search results - page 3 / 13
» A call to arms
Sort
View
CCS
2009
ACM
13 years 10 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
NIPS
2001
13 years 8 months ago
The Emergence of Multiple Movement Units in the Presence of Noise and Feedback Delay
Tangential hand velocity profiles of rapid human arm movements often appear as sequences of several bell-shaped acceleration-deceleration phases called submovements or movement un...
Michael Kositsky, Andrew G. Barto
FOCS
2007
IEEE
14 years 1 months ago
Approximation Algorithms for Partial-Information Based Stochastic Control with Markovian Rewards
We consider a variant of the classic multi-armed bandit problem (MAB), which we call FEEDBACK MAB, where the reward obtained by playing each of n independent arms varies according...
Sudipto Guha, Kamesh Munagala
ICC
2000
IEEE
157views Communications» more  ICC 2000»
13 years 11 months ago
Adaptive Reliable Multicast
We present a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the ...
Jaehee Yoon, Azer Bestavros, Ibrahim Matta
AMS
2007
Springer
296views Robotics» more  AMS 2007»
14 years 29 days ago
Learning the Inverse Model of the Dynamics of a Robot Leg by Auto-imitation
Abstract Walking, running and hopping are based on self-stabilizing oscillatory activity. In contrast, aiming movements serve to direct a limb to a desired location and demand a qu...
Karl-Theodor Kalveram, André Seyfarth