Sciweavers

2673 search results - page 526 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
USENIX
2008
13 years 10 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
P2P
2009
IEEE
143views Communications» more  P2P 2009»
14 years 2 months ago
SimGrid: a Generic Framework for Large-Scale Distributed Experiments
Distributed computing is a very broad and active research area comprising fields such as cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems. Unf...
Martin Quinson
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
14 years 7 days ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
AAAI
1998
13 years 9 months ago
Automated Intelligent Pilots for Combat Flight Simulation
TacAir-Soar is an intelligent, rule-based system that generates believable human-like" behavior for military simulations. The innovation of the application is primarily a mat...
Randolph M. Jones, John E. Laird, Paul E. Nielsen
CONNECTION
2008
178views more  CONNECTION 2008»
13 years 7 months ago
Spoken language interaction with model uncertainty: an adaptive human-robot interaction system
Spoken language is one of the most intuitive forms of interaction between humans and agents. Unfortunately, agents that interact with people using natural language often experienc...
Finale Doshi, Nicholas Roy