Sciweavers

13180 search results - page 2285 / 2636
» Network Models
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 11 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
INFOCOM
2009
IEEE
15 years 11 months ago
The Impact of Mobility on Gossip Algorithms
—We analyze how node mobility can influence the convergence time of averaging gossip algorithms on networks. Our main result is that even a small number of fully mobile nodes ca...
Anand D. Sarwate, Alexandros G. Dimakis
ATAL
2009
Springer
15 years 11 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...
DCOSS
2009
Springer
15 years 11 months ago
Detection and Localization Sensor Assignment with Exact and Fuzzy Locations
Sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplifi...
Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro...
GECCO
2009
Springer
135views Optimization» more  GECCO 2009»
15 years 11 months ago
Neuroevolutionary reinforcement learning for generalized helicopter control
Helicopter hovering is an important challenge problem in the field of reinforcement learning. This paper considers several neuroevolutionary approaches to discovering robust cont...
Rogier Koppejan, Shimon Whiteson
« Prev « First page 2285 / 2636 Last » Next »