Sciweavers

2519 search results - page 384 / 504
» Reasoning with Textual Cases
Sort
View
INFOCOM
1999
IEEE
15 years 8 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
IWCC
1999
IEEE
15 years 8 months ago
Optimizing User-Level Communication Patterns on the Fujitsu AP3000
In this paper, we present techniques and algorithms to improve the performance of various communication patterns on message-passing platforms where, for reasons of safety, user-le...
Jeremy E. Dawson, Peter E. Strazdins
132
Voted
HYBRID
1999
Springer
15 years 8 months ago
Path Planning and Flight Controller Scheduling for an Autonomous Helicopter
Abstract. In this article we investigate how to generate flight trajectories for an autonomous helicopter. The planning strategy that we propose reflects the controller architect...
Magnus Egerstedt, Tak-John Koo, Frank Hoffmann, Sh...
144
Voted
CSFW
1998
IEEE
15 years 8 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
155
Voted
AMET
1998
Springer
15 years 8 months ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...