Sciweavers

998 search results - page 176 / 200
» A framework for generating data to simulate changing environ...
Sort
View
122
Voted
IM
2007
15 years 5 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
129
Voted
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
15 years 7 months ago
Evolving a real-world vehicle warning system
Many serious automobile accidents could be avoided if drivers were warned of impending crashes before they occur. Creating such warning systems by hand, however, is a difficult an...
Nate Kohl, Kenneth O. Stanley, Risto Miikkulainen,...
132
Voted
IJCAI
2007
15 years 5 months ago
Learning to Walk through Imitation
Programming a humanoid robot to walk is a challenging problem in robotics. Traditional approaches rely heavily on prior knowledge of the robot's physical parameters to devise...
Rawichote Chalodhorn, David B. Grimes, Keith Groch...
122
Voted
IISWC
2008
IEEE
15 years 10 months ago
Accelerating multi-core processor design space evaluation using automatic multi-threaded workload synthesis
The design and evaluation of microprocessor architectures is a difficult and time-consuming task. Although small, handcoded microbenchmarks can be used to accelerate performance e...
Clay Hughes, Tao Li
131
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King