Sciweavers

8493 search results - page 1390 / 1699
» Implementing a distributed firewall
Sort
View
ATAL
2010
Springer
15 years 5 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan
ATAL
2010
Springer
15 years 5 months ago
Argumentative alternating offers
This paper presents an argumentative version of the well known alternating offers negotiation protocol. The negotichanism is based on an abstract preference based argumentation fr...
Nabila Hadidi, Yannis Dimopoulos, Pavlos Moraitis
CEC
2010
IEEE
15 years 5 months ago
A Mean-Variance Optimization algorithm
A new stochastic optimization algorithm referred to by the authors as the `Mean-Variance Optimization' (MVO) algorithm is presented in this paper. MVO falls into the category ...
Istvan Erlich, Ganesh K. Venayagamoorthy, Nakawiro...
CIDR
2009
133views Algorithms» more  CIDR 2009»
15 years 5 months ago
Principles for Inconsistency
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why co...
Shel Finkelstein, Dean Jacobs, Rainer Brendle
DIMVA
2009
15 years 5 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
« Prev « First page 1390 / 1699 Last » Next »