Sciweavers

89 search results - page 15 / 18
» Predicting Secret Keys Via Branch Prediction
Sort
View
PKDD
2009
Springer
162views Data Mining» more  PKDD 2009»
14 years 1 months ago
A Convex Method for Locating Regions of Interest with Multi-instance Learning
Abstract. In content-based image retrieval (CBIR) and image screening, it is often desirable to locate the regions of interest (ROI) in the images automatically. This can be accomp...
Yu-Feng Li, James T. Kwok, Ivor W. Tsang, Zhi-Hua ...
WCNC
2008
IEEE
14 years 1 months ago
Estimation of Link Quality and Residual Time in Vehicular Ad Hoc Networks
—High node mobility and transient connectivity in Vehicular Ad Hoc NETworks have introduced numerous challenges in the design of efficient communication protocols for these netwo...
Nikoletta Sofra, Kin K. Leung
CCGRID
2005
IEEE
14 years 10 days ago
Dynamic load balancing experiments in a grid
Connected world-widely distributed computers and data systems establish a global source of processing power and data, called a grid. Key properties of a grid are the fact that com...
Menno Dobber, Ger Koole, Robert D. van der Mei
MMAS
2004
Springer
14 years 1 days ago
Challenges in Building Very Large Teams
Abstract. When agents coordinate according to the principles of teamwork they can flexibly, robustly and reliably achieve complex goals in complex, dynamic and even hostile enviro...
Paul Scerri, Katia Sycara-Cyranski
ATAL
2006
Springer
13 years 10 months ago
Security in multiagent systems by policy randomization
Security in multiagent systems is commonly defined as the ability of the system to deal with intentional threats from other agents. This paper focuses on domains where such intent...
Praveen Paruchuri, Milind Tambe, Fernando Ord&oacu...