Sciweavers

5234 search results - page 951 / 1047
» Method Components - Rationale Revealed
Sort
View
126
Voted
CEJCS
2011
80views more  CEJCS 2011»
14 years 3 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
158
Voted
ESORICS
2011
Springer
14 years 3 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
162
Voted
ICDCS
2011
IEEE
14 years 3 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...
140
Voted
CEC
2010
IEEE
15 years 3 months ago
Coevolutionary Temporal Difference Learning for small-board Go
—In this paper we apply Coevolutionary Temporal Difference Learning (CTDL), a hybrid of coevolutionary search and reinforcement learning proposed in our former study, to evolve s...
Krzysztof Krawiec, Marcin Szubert
AAAI
2012
13 years 5 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe