Sciweavers

1502 search results - page 299 / 301
» Computational Realizations of Living Systems
Sort
View
110
Voted
ROBOCUP
1999
Springer
102views Robotics» more  ROBOCUP 1999»
15 years 3 months ago
A Method for Localization by Integration of Imprecise Vision and a Field Model
In recent years, many researchers in AI and Robotics pay attention to RoboCup, because robotic soccer games needs various techniques in AI and Robotics, such as navigation, behavi...
Kazunori Terada, Kouji Mochizuki, Atsushi Ueno, Hi...
MOBICOM
1996
ACM
15 years 3 months ago
Low-Loss TCP/IP Header Compression for Wireless Networks
Wireless is becoming a popular way to connect mobile computers to the Internet and other networks. The bandwidth of wireless links will probably always be limited due to propertie...
Mikael Degermark, Mathias Engan, Björn Nordgr...
ECRIME
2007
15 years 3 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ATAL
2006
Springer
15 years 3 months ago
Multiply-constrained distributed constraint optimization
Distributed constraint optimization (DCOP) has emerged as a useful technique for multiagent coordination. While previous DCOP work focuses on optimizing a single team objective, i...
Emma Bowring, Milind Tambe, Makoto Yokoo
CCS
2006
ACM
15 years 3 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...