Sciweavers

1454 search results - page 223 / 291
» Modeling User Affect from Causes and Effects
Sort
View
CN
2006
79views more  CN 2006»
14 years 10 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
IJNSEC
2008
201views more  IJNSEC 2008»
14 years 10 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
ISCI
2002
112views more  ISCI 2002»
14 years 9 months ago
Intelligent learning and control of autonomous robotic agents operating in unstructured environments
The control of autonomous intelligent robotic agent operating in unstructured changing environments includes many objective difficulties. One major difficulty concerns the charact...
Hani Hagras, Tarek M. Sobh
ECML
2005
Springer
15 years 3 months ago
A SAT-Based Version Space Algorithm for Acquiring Constraint Satisfaction Problems
Constraint programming is rapidly becoming the technology of choice for modelling and solving complex combinatorial problems. However, users of this technology need significant ex...
Christian Bessière, Remi Coletta, Fré...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 2 months ago
Design of insulating devices for in vitro synthetic circuits
— This paper describes a synthetic in vitro genetic circuit programmed to work as an insulating device. This circuit is composed of nucleic acids, which can be designed to intera...
Elisa Franco, Domitilla Del Vecchio, Richard M. Mu...