Sciweavers

3136 search results - page 593 / 628
» Complex networks and evolutionary computation
Sort
View
NSDI
2008
15 years 2 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
NSDI
2008
15 years 2 months ago
Hot Crap!
esn't display abstracts. Similar issues beset START (www.softconf.com), Linklings's RM 3.2 (www. linklings.com), and EasyChair (www.easychair.org). For instance, EasyChai...
Eddie Kohler
NSDI
2010
15 years 1 months ago
The Architecture and Implementation of an Extensible Web Crawler
Many Web services operate their own Web crawlers to discover data of interest, despite the fact that largescale, timely crawling is complex, operationally intensive, and expensive...
Jonathan M. Hsieh, Steven D. Gribble, Henry M. Lev...
FLAIRS
2006
15 years 1 months ago
Simulated Visual Perception-Based Control for Autonomous Mobile Agents
Autonomous robots, such as automatic vacuum cleaners, toy robot dogs, and autonomous vehicles for the military, are rapidly becoming a part of everyday life. As a result the need ...
Daniel Flower, Burkhard Wünsche, Hans W. Gues...
GRID
2006
Springer
14 years 11 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...