Sciweavers

859 search results - page 99 / 172
» The Changing Face of Cryptography
Sort
View
ECAL
2003
Springer
14 years 3 months ago
When Can We Call a System Self-Organizing?
Abstract. We do not attempt to provide yet another definition of selforganization, but explore the conditions under which we can model a system as self-organizing. These involve th...
Carlos Gershenson, Francis Heylighen
HOLOMAS
2003
Springer
14 years 3 months ago
Holonic Multiagent Systems: A Foundation for the Organisation of Multiagent Systems
With the growing usage of the world-wide ICT networks, agent technologies and multiagent systems are attracting more and more attention, as they perform well in environments that a...
Klaus Fischer, Michael Schillo, Jörg H. Siekm...
ICANN
2003
Springer
14 years 3 months ago
Meta-learning for Fast Incremental Learning
Model based learning systems usually face to a problem of forgetting as a result of the incremental learning of new instances. Normally, the systems have to re-learn past instances...
Takayuki Oohira, Koichiro Yamauchi, Takashi Omori
TRUST
2010
Springer
14 years 3 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
LCN
2002
IEEE
14 years 3 months ago
On Modeling the Packet Error Statistics in Bursty Channels
Wireless channels usually face bursty errors, i.e., errors are prone to occur in clusters. These bit errors can be modeled using the Gilbert-Elliott model. When data packets are t...
Changli Jiao, Loren Schwiebert, Bin Xu