Sciweavers

434 search results - page 64 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
SP
2003
IEEE
14 years 27 days ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
AGENTS
2000
Springer
14 years 2 min ago
MAS Infrastructure: Definitions, Needs and Prospects
This paper attempts to articulate the general role of infrastructure for multi-agent systems (MAS), and why infrastructure is a particularly critical issue if we are to increase th...
Les Gasser
ESANN
2008
13 years 9 months ago
Safe exploration for reinforcement learning
In this paper we define and address the problem of safe exploration in the context of reinforcement learning. Our notion of safety is concerned with states or transitions that can ...
Alexander Hans, Daniel Schneegaß, Anton Maxi...
NECO
2007
51views more  NECO 2007»
13 years 7 months ago
Models Wagging the Dog: Are Circuits Constructed with Disparate Parameters?
In a recent paper Prinz et al. (Nature Neurosci. 7, 1345-52 (2004)) have addressed the fundamental question, whether neural systems are built with a fixed blueprint of tightly con...
Thomas Nowotny, Attila Szücs, Rafael Levi, Al...
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun