Sciweavers

2645 search results - page 198 / 529
» Autonomous security for autonomous systems
Sort
View
152
Voted
AR
2008
188views more  AR 2008»
15 years 4 months ago
Intentional Control for Planetary Rover SRR
Intentional behavior is a basic property of intelligence and it incorporates the cyclic operation of prediction, testing by action, sensing, perceiving, and assimilating the exper...
Robert Kozma, Terry Huntsberger, Hrand Aghazarian,...
DEXAW
2005
IEEE
199views Database» more  DEXAW 2005»
15 years 10 months ago
Combining Multi-Agent-System Methodologies for Organic Computing Systems
As the complexity of computing systems steadily increases, self-managing systems – as Autonomic Computing Systems (ACS) proposed by IBM – are an adequate approach to minimize ...
Holger Kasinger, Bernhard Bauer
CSFW
2009
IEEE
15 years 11 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
OSDI
2008
ACM
16 years 4 months ago
From Optimization to Regret Minimization and Back Again
Internet routing is mostly based on static information-it's dynamicity is limited to reacting to changes in topology. Adaptive performance-based routing decisions would not o...
Ioannis C. Avramopoulos, Jennifer Rexford, Robert ...
ICCCN
2008
IEEE
15 years 11 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler