Sciweavers

CSFW
1996
IEEE
14 years 3 months ago
Towards a model of storage jamming
John P. McDermott, David M. Goldschlag
CSFW
1996
IEEE
14 years 3 months ago
A High-Throughput Secure Reliable Multicast Protocol
Dalia Malki, Michael K. Reiter
CSFW
1996
IEEE
14 years 3 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
CSFW
1996
IEEE
14 years 3 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
CSFW
1996
IEEE
14 years 3 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer
AGENTS
1997
Springer
14 years 3 months ago
Hide-and-Seek: Effective Use of Memory in Perception/Action Systems
Glenn S. Wasson, Gabriel J. Ferrer, Worthy N. Mart...
AGENTS
1997
Springer
14 years 3 months ago
Modeling an Environment: Agents in Character Feature Extraction
A feature extraction system based on artificial life concepts is presented. The system provides automatic character feature extraction through the local actions of autonomous feat...
Lijia Zhou, Stan Franklin
AGENTS
1997
Springer
14 years 3 months ago
INSIGHT: A Virtual Laboratory for Looking into Behavior-Based Autonomous Agents
This paper introduces a 3D simulation environment for experiments with behavior-based autonomous agents. The virtual laboratory INSIGHT allows the user to design and run a great v...
Simone Strippgen