Sciweavers

1998 search results - page 241 / 400
» Situated Control Rules
Sort
View
IJNSEC
2010
116views more  IJNSEC 2010»
15 years 9 days ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
JLP
2010
73views more  JLP 2010»
15 years 8 days ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky
183
Voted
SAC
2011
ACM
14 years 8 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
ACG
2009
Springer
16 years 3 days ago
Adding Expert Knowledge and Exploration in Monte-Carlo Tree Search
Abstract. We present a new exploration term, more efficient than classical UCT-like exploration terms. It combines efficiently expert rules, patterns extracted from datasets, All-M...
Guillaume Chaslot, Christophe Fiter, Jean-Baptiste...
ATAL
2008
Springer
15 years 7 months ago
Norm emergence under constrained interactions in diverse societies
Effective norms, emerging from sustained individual interactions over time, can complement societal rules and significantly enhance performance of individual agents and agent soci...
Partha Mukherjee, Sandip Sen, Stéphane Airi...