Sciweavers

4460 search results - page 790 / 892
» Formal methods for interactive systems
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 9 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
JMLR
2008
141views more  JMLR 2008»
13 years 9 months ago
Accelerated Neural Evolution through Cooperatively Coevolved Synapses
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
JALC
2006
125views more  JALC 2006»
13 years 9 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
AUTOMATICA
2005
103views more  AUTOMATICA 2005»
13 years 9 months ago
Incorporating state estimation into model predictive control and its application to network traffic control
Model predictive control (MPC) is of interest because it is one of the few control design methods which preserves standard design variables and yet handles constraints. MPC is nor...
Jun Yan, Robert R. Bitmead
IPM
2007
123views more  IPM 2007»
13 years 9 months ago
Using query logs to establish vocabularies in distributed information retrieval
Users of search engines express their needs as queries, typically consisting of a small number of terms. The resulting search engine query logs are valuable resources that can be ...
Milad Shokouhi, Justin Zobel, Seyed M. M. Tahaghog...