Sciweavers

1664 search results - page 69 / 333
» Making a Case for Multi-Agent Systems
Sort
View
ROBIO
2006
IEEE
125views Robotics» more  ROBIO 2006»
15 years 10 months ago
Multi-target Detection by Multi-sensor Systems: A Comparison of Systems
– Different methodologies exist to direct the motion of sensors to detect targets moving across an environment in various scenarios. However, some of these do not model that navi...
P. K. Ganesh, K. Madhava Krishna, Paulo Menezes
ICFP
2006
ACM
16 years 4 months ago
Extensible programming with first-class cases
We present language mechanisms for polymorphic, extensible records and their exact dual, polymorphic sums with extensible first-class cases. These features make it possible to eas...
Matthias Blume, Umut A. Acar, Wonseok Chae
CCS
2008
ACM
15 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 7 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
IPPS
2006
IEEE
15 years 10 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti