Sciweavers

16128 search results - page 2823 / 3226
» Distributed network scheduling
Sort
View
NDSS
2002
IEEE
15 years 9 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
AIMS
2010
Springer
15 years 9 months ago
On the Combined Behavior of Autonomous Resource Management Agents
Abstract. A central issue in autonomic management is how to coordinate several autonomic management processes, which is assumed to require significant knowledge exchange. This stu...
Siri Fagernes, Alva L. Couch
132
Voted
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
15 years 9 months ago
Nash equilibrium problems with congestion costs and shared constraints
Abstract— Generalized Nash equilibria (GNE) represent extensions of the Nash solution concept when agents have shared strategy sets. This generalization is particularly relevant ...
Huibing Yin, Uday V. Shanbhag, Prashant G. Mehta
GIS
2009
ACM
15 years 9 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
CCS
2001
ACM
15 years 9 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
« Prev « First page 2823 / 3226 Last » Next »