Sciweavers

2645 search results - page 208 / 529
» Autonomous security for autonomous systems
Sort
View
HYBRID
2000
Springer
15 years 8 months ago
Behavior Based Robotics Using Hybrid Automata
In this article, we show how a behavior based control system for autonomous robots can be modeled as a hybrid automaton, where each node corresponds to a distinct robot behavior. T...
Magnus Egerstedt
ICNP
2006
IEEE
15 years 10 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ATAL
2005
Springer
15 years 10 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards
DSN
2002
IEEE
15 years 9 months ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
HUC
2009
Springer
15 years 9 months ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode