Sciweavers

12301 search results - page 2267 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
142
Voted
UAI
2004
15 years 4 months ago
Solving Factored MDPs with Continuous and Discrete Variables
Although many real-world stochastic planning problems are more naturally formulated by hybrid models with both discrete and continuous variables, current state-of-the-art methods ...
Carlos Guestrin, Milos Hauskrecht, Branislav Kveto...
149
Voted
TCS
2008
15 years 3 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
137
Voted
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
15 years 1 months ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
CCS
2009
ACM
16 years 4 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
147
Voted
WWW
2009
ACM
15 years 10 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
« Prev « First page 2267 / 2461 Last » Next »