Sciweavers

591 search results - page 92 / 119
» Simulation Input Updating Using Bayesian Techniques
Sort
View
DSN
2005
IEEE
14 years 4 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
PERVASIVE
2008
Springer
13 years 10 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
SIGCOMM
1998
ACM
14 years 3 months ago
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
Abstract—The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to ...
Li Fan, Pei Cao, Jussara M. Almeida, Andrei Z. Bro...
HRI
2007
ACM
14 years 2 months ago
Learning by demonstration with critique from a human teacher
Learning by demonstration can be a powerful and natural tool for developing robot control policies. That is, instead of tedious hand-coding, a robot may learn a control policy by ...
Brenna Argall, Brett Browning, Manuela M. Veloso
WDAS
1998
14 years 6 days ago
Data Replication and Delay Balancing in Heterogeneous Disk Systems
Declustering and replication are well known techniques used to improve response time of queries in parallel disk environments. As data replication incurs a penalty for updates, da...
Doron Rotem, Sridhar Seshadri, Luis M. Bernardo