Sciweavers

1502 search results - page 299 / 301
» Computational Realizations of Living Systems
Sort
View
ROBOCUP
1999
Springer
102views Robotics» more  ROBOCUP 1999»
13 years 11 months ago
A Method for Localization by Integration of Imprecise Vision and a Field Model
In recent years, many researchers in AI and Robotics pay attention to RoboCup, because robotic soccer games needs various techniques in AI and Robotics, such as navigation, behavi...
Kazunori Terada, Kouji Mochizuki, Atsushi Ueno, Hi...
MOBICOM
1996
ACM
13 years 11 months ago
Low-Loss TCP/IP Header Compression for Wireless Networks
Wireless is becoming a popular way to connect mobile computers to the Internet and other networks. The bandwidth of wireless links will probably always be limited due to propertie...
Mikael Degermark, Mathias Engan, Björn Nordgr...
ECRIME
2007
13 years 10 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ATAL
2006
Springer
13 years 10 months ago
Multiply-constrained distributed constraint optimization
Distributed constraint optimization (DCOP) has emerged as a useful technique for multiagent coordination. While previous DCOP work focuses on optimizing a single team objective, i...
Emma Bowring, Milind Tambe, Makoto Yokoo
CCS
2006
ACM
13 years 10 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...