Sciweavers

7504 search results - page 120 / 1501
» Computing with Action Potentials
Sort
View
GECCO
2005
Springer
228views Optimization» more  GECCO 2005»
14 years 1 months ago
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions
Many non-cooperative settings that could potentially be studied using game theory are characterized by having very large strategy spaces and payoffs that are costly to compute. Be...
Ashish Sureka, Peter R. Wurman
RT
1999
Springer
14 years 7 days ago
Space-Time Hierarchical Radiosity
This paper presents a new hierarchical simulation algorithm allowing the calculation of radiosity solutions for time-dependent scenes where all motion is known a priori. Such solut...
Cyrille Damez, François X. Sillion
MAS
1998
Springer
172views Communications» more  MAS 1998»
14 years 6 days ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin

Publication
148views
13 years 9 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
HCI
2009
13 years 5 months ago
A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions
During persistent surveillance of a given population in a conflict situation, data management can quickly become unwieldy due to the inundation of low-level information from many, ...
Colleen L. Phillips, Norman D. Geddes, Justin T. S...