Sciweavers

8135 search results - page 1474 / 1627
» network 2008
Sort
View
130
Voted
EUROSYS
2008
ACM
16 years 24 days ago
Parallax: virtual disks for virtual machines
Parallax is a distributed storage system that uses virtualization to provide storage facilities specifically for virtual environments. The system employs a novel architecture in ...
Dutch T. Meyer, Gitika Aggarwal, Brendan Cully, Ge...
147
Voted
TEI
2009
ACM
173views Hardware» more  TEI 2009»
15 years 10 months ago
xtel: a development environment to support rapid prototyping of "ubiquitous content"
This paper describes the "xtel" development environment for "Ubiquitous Content". Ubiquitous contents are real space applications that are embedded in day-to-d...
Satoru Tokuhisa, Takaaki Ishizawa, Yoshimasa Niwa,...
125
Voted
CCS
2009
ACM
15 years 10 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
123
Voted
GECCO
2009
Springer
135views Optimization» more  GECCO 2009»
15 years 10 months ago
Neuroevolutionary reinforcement learning for generalized helicopter control
Helicopter hovering is an important challenge problem in the field of reinforcement learning. This paper considers several neuroevolutionary approaches to discovering robust cont...
Rogier Koppejan, Shimon Whiteson
138
Voted
ACSAC
2008
IEEE
15 years 10 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
« Prev « First page 1474 / 1627 Last » Next »