Sciweavers

443 search results - page 68 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 21 days ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
VLDB
2007
ACM
101views Database» more  VLDB 2007»
14 years 8 months ago
SQLB: A Query Allocation Framework for Autonomous Consumers and Providers
In large-scale distributed information systems, where participants are autonomous and have special interests for some queries, query allocation is a challenge. Much work in this c...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...
ATAL
2005
Springer
14 years 1 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
INFOCOM
2003
IEEE
14 years 1 months ago
User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks
— Channel-aware scheduling strategies, such as the Proportional Fair algorithm for the CDMA 1xEV-DO system, provide an effective mechanism for improving throughput performance in...
Sem C. Borst
AROBOTS
2010
180views more  AROBOTS 2010»
13 years 8 months ago
Reactive direction control for a mobile robot: a locust-like control of escape direction emerges when a bilateral pair of model
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...