Sciweavers

396 search results - page 62 / 80
» Factor Automata of Automata and Applications
Sort
View
PLDI
2005
ACM
14 years 1 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
ANCS
2006
ACM
14 years 1 months ago
Advanced algorithms for fast and scalable deep packet inspection
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic Finite Automata (DFA) are commonly used...
Sailesh Kumar, Jonathan S. Turner, John Williams
EMSOFT
2005
Springer
14 years 1 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
ATAL
2009
Springer
14 years 2 months ago
State-coupled replicator dynamics
This paper introduces a new model, i.e. state-coupled replicator dynamics, expanding the link between evolutionary game theory and multiagent reinforcement learning to multistate ...
Daniel Hennes, Karl Tuyls, Matthias Rauterberg
ATAL
2008
Springer
13 years 9 months ago
Being a part of the crowd: towards validating VR crowds using presence
Crowd simulation models are currently lacking a commonly accepted validation method. In this paper, we propose level of presence achieved by a human in a virtual environment (VE) ...
Nuria Pelechano, Catherine Stocker, Jan M. Allbeck...