Sciweavers

2414 search results - page 339 / 483
» Server-Level Power Control
Sort
View
118
Voted
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 4 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
111
Voted
AAAI
2008
15 years 4 months ago
Online Learning with Expert Advice and Finite-Horizon Constraints
In this paper, we study a sequential decision making problem. The objective is to maximize the average reward accumulated over time subject to temporal cost constraints. The novel...
Branislav Kveton, Jia Yuan Yu, Georgios Theocharou...
112
Voted
USS
2008
15 years 4 months ago
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods
Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods....
Elizabeth Stinson, John C. Mitchell
102
Voted
WSC
2008
15 years 4 months ago
Modeling and simulation of integrated intelligent systems
Complex systems consist of a large number of entities with their independent local rules and goals, along with their interactions. The effect of these properties tends to produce ...
Yongchang Li, Michael Balchanos, Bassem Nairouz, N...
118
Voted
AISB
2008
Springer
15 years 4 months ago
A Modelling Framework for Functional Imagination
Imagination is generally regarded as a very powerful and advanced cognitive ability. In this paper we propose a modelling framework for what we call functional imagination: the ab...
Hugo Gravato Marques, Owen Holland, Richard Newcom...