Sciweavers

108 search results - page 15 / 22
» ALE Application Framework for Constructing Effective RFID Ap...
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
FMCAD
2007
Springer
13 years 11 months ago
Improved Design Debugging Using Maximum Satisfiability
In today's SoC design cycles, debugging is one of the most time consuming manual tasks. CAD solutions strive to reduce the inefficiency of debugging by identifying error sourc...
Sean Safarpour, Hratch Mangassarian, Andreas G. Ve...
CORR
2004
Springer
106views Education» more  CORR 2004»
13 years 7 months ago
Intelligent Systems: Architectures and Perspectives
: The integration of different learning and adaptation techniques to overcome individual limitations and to achieve synergetic effects through the hybridization or fusion of these ...
Ajith Abraham
COMMA
2008
13 years 9 months ago
A Methodology for Action-Selection using Value-Based Argumentation
This paper describes a method for decision making using argumentation. The method is intended to produce the decision considered most likely to promote the agent's aims and as...
Fahd Saud Nawwab, Trevor J. M. Bench-Capon, Paul E...
TWC
2010
13 years 2 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...