Sciweavers

3686 search results - page 570 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 8 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
ICRA
2010
IEEE
162views Robotics» more  ICRA 2010»
13 years 6 months ago
Adaptive multi-robot coordination: A game-theoretic perspective
Multi-robot systems researchers have been investigating adaptive coordination methods for improving spatial coordination in teams. Such methods adapt the coordination method to th...
Gal A. Kaminka, Dan Erusalimchik, Sarit Kraus
MAGS
2008
149views more  MAGS 2008»
13 years 8 months ago
Agent-Grid Integration Language
The GRID and MAS (Multi-Agent Systems) communities believe in the potential of GRID and MAS to enhance each other as these models have developed significant complementarities. Thu...
Clement Jonquet, Pascal Dugenie, Stefano A. Cerri
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 8 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
CASES
2009
ACM
14 years 2 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks