Sciweavers

247 search results - page 35 / 50
» Perspectives in Probabilistic Verification
Sort
View
ICC
2007
IEEE
14 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
ROMAN
2007
IEEE
167views Robotics» more  ROMAN 2007»
14 years 3 months ago
Active Teaching in Robot Programming by Demonstration
— Robot Programming by Demonstration (RbD) covers methods by which a robot learns new skills through human guidance. In this work, we take the perspective that the role of the tea...
Sylvain Calinon, Aude Billard
ISI
2007
Springer
14 years 3 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
GECCO
2004
Springer
14 years 3 months ago
Evolving Quantum Circuits and Programs Through Genetic Programming
Abstract. Spector et al. have shown [1],[2],[3] that genetic programming can be used to evolve quantum circuits. In this paper, we present new results in this field, introducing p...
Paul Massey, John A. Clark, Susan Stepney
ICDCS
2003
IEEE
14 years 2 months ago
Updates in Highly Unreliable, Replicated Peer-to-Peer Systems
This paper studies the problem of updates in decentralised and self-organising P2P systems in which peers have low online probabilities and only local knowledge. The update strate...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer