Sciweavers

2349 search results - page 265 / 470
» Performing time-sensitive network experiments
Sort
View
IROS
2006
IEEE
190views Robotics» more  IROS 2006»
15 years 10 months ago
Q-RAN: A Constructive Reinforcement Learning Approach for Robot Behavior Learning
Abstract— This paper presents a learning system that uses Qlearning with a resource allocating network (RAN) for behavior learning in mobile robotics. The RAN is used as a functi...
Jun Li, Achim J. Lilienthal, Tomás Mart&iac...
NCA
2006
IEEE
15 years 10 months ago
A Primary-Backup Protocol for In-Memory Database Replication
The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control...
Lásaro J. Camargos, Fernando Pedone, Rodrig...
INFOSECCD
2006
ACM
15 years 10 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
GECCO
2005
Springer
152views Optimization» more  GECCO 2005»
15 years 9 months ago
Multi-level genetic algorithm (MLGA) for the construction of clock binary tree
The clock signal and clock skew become more and more important for the circuit performance. Since there are salient shortcomings in the conventional topology construction algorith...
Guofang Nan, Minqiang Li, Jisong Kou
DSN
2003
IEEE
15 years 9 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion