Sciweavers

23557 search results - page 4259 / 4712
» Distributed Computing - Introduction
Sort
View
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
132
Voted
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
15 years 5 months ago
Multi-agent task allocation: learning when to say no
This paper presents a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Exper...
Adam Campbell, Annie S. Wu, Randall Shumaker
GECON
2008
Springer
152views Business» more  GECON 2008»
15 years 5 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
153
Voted
GISCIENCE
2008
Springer
186views GIS» more  GISCIENCE 2008»
15 years 5 months ago
Detecting Topological Change Using a Wireless Sensor Network
Dynamic geographic phenomena, such as forest fires and oil spills, can have dire environmental, sociopolitical, and economic consequences. Mitigating, if not preventing such events...
Christopher Farah, Cheng Zhong, Michael F. Worboys...
143
Voted
ICMCS
2010
IEEE
217views Multimedia» more  ICMCS 2010»
15 years 5 months ago
3D Image format identification by image difference
Many 3D formats exist and will co-exist for a long time since there is no 3D standard that defines a generally accepted 3D format. The support for multiple 3D formats will be impo...
Tao Zhang
« Prev « First page 4259 / 4712 Last » Next »