Sciweavers

529 search results - page 79 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
IFIP
2007
Springer
14 years 1 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
LOGCOM
2008
110views more  LOGCOM 2008»
13 years 7 months ago
Sum and Product in Dynamic Epistemic Logic
The Sum-and-Product riddle was first published in [Fre69]. We provide an overview on the history of the dissemination of this riddle through the academic and puzzle-math community...
Hans P. van Ditmarsch, Ji Ruan, Rineke Verbrugge
ICCS
2007
Springer
14 years 1 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
CDC
2010
IEEE
146views Control Systems» more  CDC 2010»
13 years 2 months ago
Adaptive autonomous soaring of multiple UAVs using Simultaneous Perturbation Stochastic Approximation
Abstract-- This paper presents a new algorithm for maximizing the flight duration of a single UAV (Uninhabited Air Vehicle) and UAVs group using the thermal model developed by Alle...
Cathrine Antal, Oleg Granichin, Sergey Levi
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
14 years 8 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida