Sciweavers

16206 search results - page 3100 / 3242
» At Issue
Sort
View
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 1 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 1 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JAIR
2008
113views more  JAIR 2008»
15 years 1 months ago
Graphical Model Inference in Optimal Control of Stochastic Multi-Agent Systems
In this article we consider the issue of optimal control in collaborative multi-agent systems with stochastic dynamics. The agents have a joint task in which they have to reach a ...
Bart van den Broek, Wim Wiegerinck, Bert Kappen
COR
2007
80views more  COR 2007»
15 years 1 months ago
Scheduling with tool changes to minimize total completion time under controllable machining conditions
Scheduling under controllable machining conditions has been studied for some time. Scheduling with tool changes, particularly due to tool wear, has just begun to receive attention...
M. Selim Akturk, Jay B. Ghosh, Rabia K. Kayan
JANCL
2008
109views more  JANCL 2008»
15 years 1 months ago
Conditionalization and total knowledge
This paper employs epistemic logic to investigate the philosophical foundations of Bayesian updating in belief revision. By Bayesian updating, we understand the tenet that an agen...
Ian Pratt-Hartmann
« Prev « First page 3100 / 3242 Last » Next »