Sciweavers

578 search results - page 87 / 116
» Coordinating autonomous entities
Sort
View
UIST
2000
ACM
15 years 2 months ago
A programming model for active documents
Traditionally, designers organize software system as active end-points (e.g. applications) linked by passive infrastructures (e.g. networks). Increasingly, however, networks and i...
Paul Dourish, W. Keith Edwards, Jon Howell, Anthon...
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 2 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
GLOBECOM
2009
IEEE
15 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
AIPR
2008
IEEE
15 years 3 days ago
Full body tracking using an agent-based architecture
We present an agent-based full body tracking and 3D animation system to generate motion data using stereo calibrated cameras. The novelty of our approach is that agents are bound t...
Bing Fang, Liguang Xie, Pak-Kiu Chung, Yong Cao, F...
ATAL
2008
Springer
15 years 3 days ago
MB-AIM-FSI: a model based framework for exploiting gradient ascent multiagent learners in strategic interactions
Future agent applications will increasingly represent human users autonomously or semi-autonomously in strategic interactions with similar entities. Hence, there is a growing need...
Doran Chakraborty, Sandip Sen