Sciweavers

127 search results - page 11 / 26
» Testing Security Properties of Protocol Implementations - a ...
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 2 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
ICIRA
2009
Springer
98views Robotics» more  ICIRA 2009»
13 years 6 months ago
Robot Formations for Area Coverage
Abstract. Two algorithms for area coverage (for use in space applications) were evaluated using a simulator and then tested on a multi-robot society consisting of LEGO Mindstorms r...
Jürgen Leitner
ECAI
2000
Springer
14 years 29 days ago
Similarity-based Approach to Relevance Learning
In several information retrieval (IR) systems there is a possibility for user feedback. Many machine learning methods have been proposed that learn from the feedback information in...
Rickard Cöster, Lars Asker
CCGRID
2003
IEEE
14 years 1 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
NIPS
2001
13 years 10 months ago
A kernel method for multi-labelled classification
This article presents a Support Vector Machine (SVM) like learning system to handle multi-label problems. Such problems are usually decomposed into many two-class problems but the...
André Elisseeff, Jason Weston