Sciweavers

6808 search results - page 982 / 1362
» Distributed Concurrency Control
Sort
View
WCE
2007
15 years 6 months ago
Nonstationary Inverse Source Problem of Active Shielding
—The problem of active shielding of some domains from the effect of the sources distributed in other domains is considered. The problem can be formulated either in a bounded dom...
S. V. Utyuzhnikov
DIMVA
2009
15 years 6 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
GECCO
2008
Springer
161views Optimization» more  GECCO 2008»
15 years 6 months ago
Neuro-evolution for a gathering and collective construction task
In this paper we apply three Neuro-Evolution (NE) methods as controller design approaches in a collective behavior task. These NE methods are Enforced Sub-Populations, MultiAgent ...
D. W. F. van Krevelen, Geoff S. Nitschke
SIGCOMM
2010
ACM
15 years 5 months ago
Towards software-friendly networks
There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. Howev...
Kok-Kiong Yap, Te-Yuan Huang, Ben Dodson, Monica S...
HAPTICS
2008
IEEE
15 years 5 months ago
Efficient Transport Protocol for Networked Haptics Applications
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. Th...
Raul Wirz, Manuel Ferre, Raúl Marín,...