Sciweavers

7106 search results - page 1347 / 1422
» Restricted Complexity, General Complexity
Sort
View
NSDI
2008
14 years 11 days ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
AOSD
2008
ACM
14 years 1 days ago
Support for distributed adaptations in aspect-oriented middleware
Many aspect-oriented middleware platforms support run-time aspect weaving, but do not support coordinating distributed changes to a set of aspects at run-time. A distributed chang...
Eddy Truyen, Nico Janssens, Frans Sanen, Wouter Jo...
ASPLOS
2008
ACM
14 years 1 days ago
Optimistic parallelism benefits from data partitioning
Recent studies of irregular applications such as finite-element mesh generators and data-clustering codes have shown that these applications have a generalized data parallelism ar...
Milind Kulkarni, Keshav Pingali, Ganesh Ramanaraya...
ATAL
2008
Springer
14 years 1 days ago
MADeM: a multi-modal decision making for social MAS
This paper presents MADeM, a multi-modal agent decision making to provide virtual agents with socially acceptable decisions. We consider multi-modal decisions as those that are ab...
Francisco Grimaldo, Miguel Lozano, Fernando Barber
ATAL
2008
Springer
14 years 1 days ago
Approximating power indices
Many multiagent domains where cooperation among agents is crucial to achieving a common goal can be modeled as coalitional games. However, in many of these domains, agents are une...
Yoram Bachrach, Evangelos Markakis, Ariel D. Proca...
« Prev « First page 1347 / 1422 Last » Next »