Sciweavers

5948 search results - page 1166 / 1190
» Computing Robust Counter-Strategies
Sort
View
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 3 months ago
Model Checking Discounted Temporal Properties
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, tempor...
Luca de Alfaro, Marco Faella, Thomas A. Henzinger,...
COMPSAC
2003
IEEE
15 years 3 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
ICMENS
2003
IEEE
153views Hardware» more  ICMENS 2003»
15 years 3 months ago
Biologically Inspired Intelligent Robots Using Artificial Muscles
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
Yoseph Bar-Cohen
SENSYS
2003
ACM
15 years 3 months ago
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information
The widespread deployment of sensor networks is on the horizon. One of the main challenges in sensor networks is to process and aggregate data in the network rather than wasting e...
James Newsome, Dawn Xiaodong Song
DRM
2003
Springer
15 years 3 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
« Prev « First page 1166 / 1190 Last » Next »