Sciweavers

1665 search results - page 318 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
ICS
2010
Tsinghua U.
15 years 7 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
NETGAMES
2005
ACM
15 years 3 months ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
AGENTS
1997
Springer
15 years 1 months ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso
JUCS
2008
143views more  JUCS 2008»
14 years 9 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou