Sciweavers

5792 search results - page 1104 / 1159
» Communicating With Multiple Agents
Sort
View
SIROCCO
2008
13 years 10 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...
ACSW
2006
13 years 10 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
IJCAI
2003
13 years 10 months ago
Towards Pervasive Robotics
Pervasive robotics will require, in a near future, small, light and cheap robots that exhibit complex behaviors. These demands led to the development of the M2-M4 Macaco project -...
Artur M. Arsenio
USENIX
1994
13 years 10 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
« Prev « First page 1104 / 1159 Last » Next »