Sciweavers

621 search results - page 92 / 125
» Integrated Event Recognition from Multiple Sources
Sort
View
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
14 years 20 days ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
DKE
2006
138views more  DKE 2006»
13 years 8 months ago
Using the uni-level description (ULD) to support data-model interoperability
We describe a framework called the Uni-Level Description (ULD) for accurately representing information from a broad range of data models. The ULD extends previous metadata-model a...
Shawn Bowers, Lois M. L. Delcambre
AGENTS
2001
Springer
14 years 1 months ago
A social reinforcement learning agent
We report on the use of reinforcement learning with Cobot, a software agent residing in the wellknown online community LambdaMOO. Our initial work on Cobot (Isbell et al.2000) pro...
Charles Lee Isbell Jr., Christian R. Shelton, Mich...
MICRO
1999
IEEE
123views Hardware» more  MICRO 1999»
14 years 1 months ago
Improving Branch Predictors by Correlating on Data Values
Branch predictors typically use combinations of branch PC bits and branch histories to make predictions. Recent improvements in branch predictors have come from reducing the effec...
Timothy H. Heil, Zak Smith, James E. Smith
IJAHUC
2006
71views more  IJAHUC 2006»
13 years 8 months ago
Elapsed time on arrival: a simple and versatile primitive for canonical time synchronisation services
: Time synchronisation is one of the most important and fundamental middleware services for wireless sensor networks. However, there is an apparent disconnect between existing time...
Branislav Kusy, Prabal Dutta, Philip Levis, Mikl&o...