Sciweavers

891 search results - page 124 / 179
» Co-evolution, Determinism and Robustness
Sort
View
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 1 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
HRI
2006
ACM
14 years 1 months ago
Working with robots and objects: revisiting deictic reference for achieving spatial common ground
Robust joint visual attention is necessary for achieving a common frame of reference between humans and robots interacting multimodally in order to work together on realworld spat...
Andrew G. Brooks, Cynthia Breazeal
NETGAMES
2006
ACM
14 years 1 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura
SIGCSE
2006
ACM
163views Education» more  SIGCSE 2006»
14 years 1 months ago
TextMOLE: text mining operations library and environment
The paper describes the first version of the TextMOLE (Text Mining Operations Library and Environment) system for textual data mining. Currently TextMOLE acts as an advanced inde...
Daniel B. Waegel, April Kontostathis
SIGMETRICS
2006
ACM
123views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Exploiting redundancy to conserve energy in storage systems
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it e...
Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnic...