Sciweavers

2302 search results - page 386 / 461
» Privacy-preserving Distributed Clustering using Generative M...
Sort
View
122
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
144
Voted
ICSOC
2007
Springer
15 years 8 months ago
Towards Self-management in Service-Oriented Computing with Modes
Abstract. A self-managed system is both self-assembling and selfhealing. Service-oriented Computing (SoC) architectures, such as a Web Services Architecture (WS-A) illustrate a hig...
Howard Foster, Sebastián Uchitel, Jeff Kram...
AAAI
2004
15 years 4 months ago
Analogical Path Planning
We present a probabilistic method for path planning that considers trajectories constrained by both the environment and an ensemble of restrictions or preferences on preferred mot...
Saul Simhon, Gregory Dudek
128
Voted
PVM
2010
Springer
15 years 1 months ago
PMI: A Scalable Parallel Process-Management Interface for Extreme-Scale Systems
Parallel programming models on large-scale systems require a scalable system for managing the processes that make up the execution of a parallel program. The process-management sys...
Pavan Balaji, Darius Buntinas, David Goodell, Will...
TSMC
2010
14 years 9 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...