Sciweavers

3532 search results - page 704 / 707
» Overlay networks with class
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
CONNECTION
2010
144views more  CONNECTION 2010»
14 years 6 months ago
The roles of the amygdala in the affective regulation of body, brain, and behaviour
Abstract. Despite the great amount of knowledge produced by the neuroscientific literature affective phenomena, current models tackling noncognitive aspects of behavior are often b...
Marco Mirolli, Francesco Mannella, Gianluca Baldas...
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
14 years 6 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
CDC
2010
IEEE
117views Control Systems» more  CDC 2010»
14 years 4 months ago
Distributed iterative regularization algorithms for monotone Nash games
In this paper, we consider the development of single-timescale schemes for the distributed computation of Nash equilibria. In general, equilibria associated with convex Nash games ...
Aswin Kannan, Uday V. Shanbhag
CDC
2010
IEEE
104views Control Systems» more  CDC 2010»
14 years 4 months ago
Single timescale regularized stochastic approximation schemes for monotone Nash games under uncertainty
Abstract-- In this paper, we consider the distributed computation of equilibria arising in monotone stochastic Nash games over continuous strategy sets. Such games arise in setting...
Jayash Koshal, Angelia Nedic, Uday V. Shanbhag