Sciweavers

4985 search results - page 885 / 997
» Observation of String-Rewriting Systems
Sort
View
144
Voted
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
165
Voted
RTAS
2010
IEEE
15 years 2 months ago
Scheduling Self-Suspending Real-Time Tasks with Rate-Monotonic Priorities
Abstract—Recent results have shown that the feasibility problem of scheduling periodic tasks with self-suspensions is NPhard in the strong sense. We observe that a variation of t...
Karthik Lakshmanan, Ragunathan Rajkumar
149
Voted
SAB
2010
Springer
153views Optimization» more  SAB 2010»
15 years 2 months ago
Cooperative Stigmergic Navigation in a Heterogeneous Robotic Swarm
We study self-organized cooperation in a heterogeneous robotic swarm consisting of two sub-swarms. The robots of each sub-swarm play distinct roles based on their different charac...
Frederick Ducatelle, Gianni A. Di Caro, Luca Maria...
131
Voted
SIAMJO
2010
83views more  SIAMJO 2010»
15 years 2 months ago
The Lifted Newton Method and Its Application in Optimization
Abstract. We present a new “lifting” approach for the solution of nonlinear optimization problems (NLPs) that have objective and constraint functions with intermediate variable...
Jan Albersmeyer, Moritz Diehl
157
Voted
CASES
2010
ACM
15 years 1 months ago
Improved procedure placement for set associative caches
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
Yun Liang, Tulika Mitra