Sciweavers

310 search results - page 62 / 62
» Addressing the Challenge of Distributed Interactive Simulati...
Sort
View
CCS
2010
ACM
13 years 5 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
INFOCOM
2006
IEEE
13 years 11 months ago
A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks
— Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In ...
Jianfeng Wang, Yuguang Fang, Dapeng Oliver Wu
INFOCOM
2011
IEEE
12 years 9 months ago
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks
Abstract—In this paper, we investigate the problem of maximizing the throughput over a finite-horizon time period for a sensor network with energy replenishment. The finite-horiz...
Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changh...
ATAL
2007
Springer
13 years 9 months ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
CONEXT
2009
ACM
13 years 6 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...