Sciweavers

17185 search results - page 3347 / 3437
» Computational and Quantitative Studies
Sort
View
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
14 years 11 months ago
How social structure and institutional order co-evolve beyond instrumental rationality
This study proposes an agent-based model where adaptively learning agents with local vision who are situated in the Prisoner’s Dilemma game change their strategy and location as...
Jae-Woo Kim
MOBICOM
2010
ACM
14 years 10 months ago
Directional antenna diversity for mobile devices: characterizations and solutions
We report a first-of-its-kind realization of directional transmission for smartphone-like mobile devices using multiple passive directional antennas, supported by only one RF chai...
Ardalan Amiri Sani, Lin Zhong, Ashutosh Sabharwal
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
14 years 10 months ago
Theory and new primitives for safely connecting routing protocol instances
Recent studies have shown that the current primitives for connecting multiple routing protocol instances (OSPF 1, OSPF 2, EIGRP 10, etc.) are pervasively deployed in enterprise ne...
Franck Le, Geoffrey G. Xie, Hui Zhang
SIGCOMM
2010
ACM
14 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
« Prev « First page 3347 / 3437 Last » Next »