Sciweavers

26496 search results - page 5160 / 5300
» An Approach to Computing Ethics
Sort
View
ADHOCNOW
2005
Springer
15 years 3 months ago
MIMOMAN: A MIMO MAC Protocol for Ad Hoc Networks
Multiple-Input Multiple-Output (MIMO) antenna systems present a radical way to improve the performance of wireless communications. Such systems can be utilized in wireless ad hoc n...
Joon-Sang Park, Mario Gerla
ATAL
2005
Springer
15 years 3 months ago
Improving reinforcement learning function approximators via neuroevolution
Reinforcement learning problems are commonly tackled with temporal difference methods, which use dynamic programming and statistical sampling to estimate the long-term value of ta...
Shimon Whiteson
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
FOSSACS
2005
Springer
15 years 3 months ago
Branching Cells as Local States for Event Structures and Nets: Probabilistic Applications
We study the concept of choice for true concurrency models such as prime event structures and safe Petri nets. We propose a dynamic variation of the notion of cluster previously in...
Samy Abbes, Albert Benveniste
« Prev « First page 5160 / 5300 Last » Next »