Sciweavers

796 search results - page 17 / 160
» Spoofing prevention method
Sort
View
CDC
2010
IEEE
130views Control Systems» more  CDC 2010»
13 years 4 months ago
A fast well-conditioned interior point method for predictive control
Interior point methods (IPMs) have proven to be an efficient way of solving quadratic programming problems in predictive control. A linear system of equations needs to be solved in...
Amir Shahzad, Eric C. Kerrigan, George A. Constant...
INFOCOM
2008
IEEE
14 years 4 months ago
A Trust and Reputation based Anti-SPIM Method
—Instant Messaging (IM) service is a killer application in the Internet. Due to the problem of IM spam (SPIM), building an effective anti-spim method is an important research top...
Jun Bi, Jianping Wu, Wenmao Zhang
DNA
2004
Springer
157views Bioinformatics» more  DNA 2004»
14 years 3 months ago
Bond-Free Languages: Formalizations, Maximality and Construction Methods
The problem of negative design of DNA languages is addressed, that is, properties and construction methods of large sets of words that prevent undesired bonds when used in DNA com...
Lila Kari, Stavros Konstantinidis, Petr Sosí...
ICISS
2009
Springer
13 years 7 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
CP
2009
Springer
14 years 10 months ago
An Interpolation Method for CLP Traversal
We consider the problem of exploring the search tree of a CLP goal in pursuit of a target property. Essential to such a process is a method of tabling to prevent duplicate explorat...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu