Sciweavers

5055 search results - page 950 / 1011
» Relative Timing
Sort
View
USS
2008
15 years 2 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
COCO
2010
Springer
149views Algorithms» more  COCO 2010»
15 years 1 months ago
Trade-Off Lower Bounds for Stack Machines
—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a...
Matei David, Periklis A. Papakonstantinou
APPROX
2008
Springer
142views Algorithms» more  APPROX 2008»
15 years 1 months ago
Approximating Maximum Subgraphs without Short Cycles
We study approximation algorithms, integrality gaps, and hardness of approximation, of two problems related to cycles of "small" length k in a given graph. The instance f...
Guy Kortsarz, Michael Langberg, Zeev Nutov
ASWC
2008
Springer
15 years 1 months ago
ROC: A Method for Proto-ontology Construction by Domain Experts
Abstract. Ontology construction is a labour-intensive and costly process. Even though many formal and semi-formal vocabularies are available, creating an ontology for a specific ap...
Nicole J. J. P. Koenderink, Mark van Assem, J. Lar...
ATAL
2008
Springer
15 years 1 months ago
Sensing-based shape formation on modular multi-robot systems: a theoretical study
This paper presents a theoretical study of decentralized control for sensing-based shape formation on modular multirobot systems, where the desired shape is specified in terms of ...
Chih-Han Yu, Radhika Nagpal