Sciweavers

8177 search results - page 1423 / 1636
» Detecting System Emulators
Sort
View
OTM
2009
Springer
15 years 10 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
SARA
2009
Springer
15 years 10 months ago
Reformulating Planning Problems by Eliminating Unpromising Actions
Despite a big progress in solving planning problems, more complex problems still remain hard and challenging for existing planners. One of the most promising research directions i...
Lukás Chrpa, Roman Barták
SARA
2009
Springer
15 years 10 months ago
Automated Redesign with the General Redesign Engine
: Given a system design (SD), a key task is to optimize this design to reduce the probability of catastrophic failures. We consider the task of redesigning an SD to minimize the pr...
Alexander Feldman, Gregory M. Provan, Johan de Kle...
IMC
2009
ACM
15 years 10 months ago
Where's that phone?: geolocating IP addresses on 3G networks
Cell phones connected to high-speed 3G networks constitute an increasingly important class of clients on the Internet. From the viewpoint of the servers they connect to, such devi...
Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ra...
DATE
2008
IEEE
143views Hardware» more  DATE 2008»
15 years 10 months ago
Comparison of Opamp-Based and Comparator-Based Delta-Sigma Modulation
Comparator-based switched capacitor (CBSC) circuits present an alternative approach to designing sampled data systems based on the principle of detecting a virtual ground conditio...
Massoud Momeni, Petru Bogdan Bacinschi, Manfred Gl...
« Prev « First page 1423 / 1636 Last » Next »