Sciweavers

2918 search results - page 519 / 584
» Design tools for reliability analysis
Sort
View
AAMAS
2007
Springer
14 years 4 months ago
Networks of Learning Automata and Limiting Games
Learning Automata (LA) were recently shown to be valuable tools for designing Multi-Agent Reinforcement Learning algorithms. One of the principal contributions of LA theory is that...
Peter Vrancx, Katja Verbeeck, Ann Nowé
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
MINENET
2006
ACM
14 years 3 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
MM
2006
ACM
184views Multimedia» more  MM 2006»
14 years 3 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 3 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai