Sciweavers

413 search results - page 50 / 83
» Computing and Exploiting Tree-Decompositions for Solving Con...
Sort
View
TOG
2008
101views more  TOG 2008»
15 years 1 months ago
Synthesis of constrained walking skills
Simulated characters in simulated worlds require simulated skills. We develop control strategies that enable physically-simulated characters to dynamically navigate environments w...
Stelian Coros, Philippe Beaudoin, KangKang Yin, Mi...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 7 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 7 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
WIOPT
2010
IEEE
14 years 11 months ago
Resource allocation for cross-layer utility maximization in multi-hop wireless networks in the presence of self interference
Abstract—The cross-layer utility maximization problem subject to stability constraints is considered for a multi-hop wireless network. A time slotted network, where the channel g...
Chathuranga Weeraddana, Marian Codreanu, Matti Lat...
EOR
2011
134views more  EOR 2011»
14 years 8 months ago
Linear programming based decomposition methods for inventory distribution systems
We consider an inventory distribution system consisting of one warehouse and multiple retailers. The retailers face random demand and are supplied by the warehouse. The warehouse ...
Sumit Kunnumkal, Huseyin Topaloglu