Sciweavers

31387 search results - page 6219 / 6278
» Abstracting abstract machines
Sort
View
JBCS
2010
89views more  JBCS 2010»
13 years 3 months ago
Multicoordinated agreement for groups of agents
Agents in agreement protocols play well distinct roles. Proposers propose values to the acceptors, which will accept proposals and inform the learners so they detect that an agree...
Lásaro J. Camargos, Rodrigo Schmidt, Edmund...
JCNS
2010
138views more  JCNS 2010»
13 years 3 months ago
Experimental validation of the influence of white matter anisotropy on the intracranial EEG forward solution
Abstract Forward solutions with different levels of complexity are employed for localization of current generators, which are responsible for the electric and magnetic fields measu...
Nitin B. Bangera, Donald L. Schomer, Nima Dehghani...
JCST
2010
155views more  JCST 2010»
13 years 3 months ago
Efficient Location Updates for Continuous Queries over Moving Objects
Abstract The significant overhead related to frequent location updates from moving objects often results in poor performance. As most of the location updates do not affect the quer...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
JIPS
2010
195views more  JIPS 2010»
13 years 3 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
JOC
2010
123views more  JOC 2010»
13 years 3 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
« Prev « First page 6219 / 6278 Last » Next »