Sciweavers

373 search results - page 58 / 75
» Covariant Policy Search
Sort
View
CCS
2011
ACM
12 years 9 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
ICFP
2010
ACM
13 years 10 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
COMCOM
2006
188views more  COMCOM 2006»
13 years 9 months ago
Dynamic bandwidth allocation for QoS routing on TDMA-based mobile ad hoc networks
The paper proposes several dynamic bandwidth allocation strategies for QoS routing on TDMA-based mobile ad hoc networks. Comprehensively, these strategies are called a distributed...
Kuei-Ping Shih, Chih-Yung Chang, Yen-Da Chen, Tsun...
ICS
2009
Tsinghua U.
13 years 6 months ago
Refereeing conflicts in hardware transactional memory
In the search for high performance, most transactional memory (TM) systems execute atomic blocks concurrently and must thus be prepared for data conflicts. The TM system must then...
Arrvindh Shriraman, Sandhya Dwarkadas
CORR
2011
Springer
219views Education» more  CORR 2011»
13 years 4 months ago
Active Markov Information-Theoretic Path Planning for Robotic Environmental Sensing
Recent research in multi-robot exploration and mapping has focused on sampling environmental fields, which are typically modeled using the Gaussian process (GP). Existing informa...
Kian Hsiang Low, John M. Dolan, Pradeep K. Khosla