Sciweavers

734 search results - page 39 / 147
» Computer Virus Propagation Models
Sort
View
DAC
1999
ACM
15 years 2 months ago
Buffer Insertion with Accurate Gate and Interconnect Delay Computation
Buffer insertion has become a critical step in deep submicron design, and several buffer insertion/sizing algorithms have been proposed in the literature. However, most of these m...
Charles J. Alpert, Anirudh Devgan, Stephen T. Quay
IJCAI
2007
14 years 11 months ago
Computational Aspects of Analyzing Social Network Dynamics
Motivated by applications such as the spread of epidemics and the propagation of influence in social networks, we propose a formal model for analyzing the dynamics of such networ...
Christopher L. Barrett, Harry B. Hunt III, Madhav ...
AGI
2011
14 years 1 months ago
What Makes a Brain Smart? Reservoir Computing as an Approach for General Intelligence
Abstract. Recurrent connectivity, balanced between excitation and inhibition, is a general principle of cortical connectivity. We propose that balanced recurrence can be achieved b...
Janelle Szary, Bryan Kerster, Christopher T. Kello
NSPW
2006
ACM
15 years 3 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon
HPDC
2002
IEEE
15 years 2 months ago
Software Architecture-Based Adaptation for Grid Computing
Grid applications must increasingly self-adapt dynamically to changing environments. In most cases, adaptation has been implemented in an ad hoc fashion, on a perapplication basis...
Shang-Wen Cheng, David Garlan, Bradley R. Schmerl,...