Sciweavers

6693 search results - page 996 / 1339
» On an anytime algorithm for control
Sort
View
132
Voted
CCS
2008
ACM
15 years 6 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
CCS
2008
ACM
15 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ATAL
2005
Springer
15 years 5 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
ATAL
2006
Springer
15 years 5 months ago
Selecting informative actions improves cooperative multiagent learning
In concurrent cooperative multiagent learning, each agent simultaneously learns to improve the overall performance of the team, with no direct control over the actions chosen by i...
Liviu Panait, Sean Luke
CONEXT
2008
ACM
15 years 5 months ago
TDM MAC protocol design and implementation for wireless mesh networks
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multihop wireless mesh networks using a programmable wireless platform. E...
Dimitrios Koutsonikolas, Theodoros Salonidis, Henr...