Sciweavers

4815 search results - page 737 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
138
Voted
WICSA
2004
15 years 6 months ago
Symphony: View-Driven Software Architecture Reconstruction
Authentic descriptions of a software architecture are required as a reliable foundation for any but trivial changes to a system. Far too often, architecture descriptions of existi...
Arie van Deursen, Christine Hofmeister, Rainer Kos...
IJISEC
2006
106views more  IJISEC 2006»
15 years 4 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
JMLR
2006
153views more  JMLR 2006»
15 years 4 months ago
Collaborative Multiagent Reinforcement Learning by Payoff Propagation
In this article we describe a set of scalable techniques for learning the behavior of a group of agents in a collaborative multiagent setting. As a basis we use the framework of c...
Jelle R. Kok, Nikos A. Vlassis
INFOCOM
2010
IEEE
15 years 2 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
CVPR
2011
IEEE
15 years 2 days ago
High Level Describable Attributes for Predicting Aesthetics and Interestingness
With the rise in popularity of digital cameras, the amount of visual data available on the web is growing exponentially. Some of these pictures are extremely beautiful and aesthet...
Sagnik Dhar, Vicente Ordonez, Tamara Berg