Sciweavers

11129 search results - page 2211 / 2226
» Modeling Search Computing Applications
Sort
View
NSPW
2003
ACM
15 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CAISE
2003
Springer
15 years 3 months ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp
WOLLIC
2010
Springer
15 years 2 months ago
Modal Logics with Counting
Abstract. We present a modal language that includes explicit operators to count the number of elements that a model might include in the extension of a formula, and we discuss how ...
Carlos Areces, Guillaume Hoffmann, Alexandre Denis
ICRA
2002
IEEE
104views Robotics» more  ICRA 2002»
15 years 2 months ago
Improbability Filtering for Rejecting False Positives
—In this paper we describe a novel approach, called improbability filtering, to rejecting false-positive observations from degrading the tracking performance of an Extended Kalma...
Brett Browning, Michael H. Bowling, Manuela M. Vel...
SIGECOM
2010
ACM
156views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Robust mechanisms for risk-averse sellers
The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good ...
Mukund Sundararajan, Qiqi Yan
« Prev « First page 2211 / 2226 Last » Next »