Sciweavers

1524 search results - page 266 / 305
» Computing effective communication policies in multiagent sys...
Sort
View
ICWN
2007
15 years 3 months ago
Comparing Agent Paradigms for Resource Management in Sensor Networks
— Management of power and other resources that effect field life is an important consideration in sensor networks. This paper presents and compares alternative agent paradigms ap...
Anish Anthony, Thomas C. Jannett
TSE
2010
230views more  TSE 2010»
14 years 8 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
SIGGRAPH
1995
ACM
15 years 5 months ago
A frequency-domain analysis of head-motion prediction
The use of prediction to eliminate or reduce the effects of system delays in Head-Mounted Display systems has been the subject of several recent papers. A variety of methods have ...
Ronald Azuma, Gary Bishop
SIGCOMM
2010
ACM
15 years 2 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
CCS
2010
ACM
14 years 12 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...