Sciweavers

2645 search results - page 382 / 529
» Autonomous security for autonomous systems
Sort
View
MODELS
2010
Springer
15 years 2 months ago
Automatically Discovering Properties That Specify the Latent Behavior of UML Models
Formal analysis can be used to verify that a model of the system adheres to its requirements. As such, traditional formal analysis focuses on whether known (desired) system propert...
Heather Goldsby, Betty H. C. Cheng
IFIP
2010
Springer
14 years 11 months ago
Combining Software and Hardware LCS for Lightweight On-Chip Learning
In this paper we present a novel two-stage method to realize a lightweight but very capable hardware implementation of a Learning Classifier System for on-chip learning. Learning C...
Andreas Bernauer, Johannes Zeppenfeld, Oliver Brin...
SIGMOBILE
2010
138views more  SIGMOBILE 2010»
14 years 11 months ago
A self-organizing localization reference grid
We propose a non-persistent indoor localization system using a self-organizing reference grid of autonomous robot systems. The key idea is to continuously maintain accurate relati...
Juergen Eckert, Félix Jesús Villanue...
SAC
2011
ACM
14 years 7 months ago
Site-autonomous distributed semantic caching
Semantic caching augments cached data with a semantic description of the data. These semantic descriptions can be used to improve execution time for similar queries by retrieving ...
Norvald H. Ryeng, Jon Olav Hauglid, Kjetil N&oslas...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...