Sciweavers

5234 search results - page 930 / 1047
» Simulation of Computer Network Attacks
Sort
View
LCN
2003
IEEE
15 years 8 months ago
Characterization of the Burst Stabilization Protocol for the RR/RR CICQ Switch
Input buffered switches with Virtual Output Queueing (VOQ) can be unstable when presented with unbalanced loads. Existing scheduling algorithms, including iSLIP for Input Queued (...
Neil J. Gunther, Kenneth J. Christensen, Kenji Yos...
CONTEXT
2003
Springer
15 years 8 months ago
A SAT-Based Algorithm for Context Matching
The development of more and more complex distributed applications over large networks of computers has raised the problem of semantic interoperability across applications based on ...
Paolo Bouquet, Bernardo Magnini, Luciano Serafini,...
145
Voted
CCS
1998
ACM
15 years 7 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
134
Voted
AAAI
2006
15 years 4 months ago
Value-Function-Based Transfer for Reinforcement Learning Using Structure Mapping
Transfer learning concerns applying knowledge learned in one task (the source) to improve learning another related task (the target). In this paper, we use structure mapping, a ps...
Yaxin Liu, Peter Stone
IASTEDSEA
2004
15 years 4 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer