Sciweavers

1306 search results - page 253 / 262
» Strategy Acquisition for the Game
Sort
View
ICASSP
2008
IEEE
15 years 7 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
110
Voted
CAV
2007
Springer
166views Hardware» more  CAV 2007»
15 years 6 months ago
Fast and Accurate Static Data-Race Detection for Concurrent Programs
We present new techniques for fast, accurate and scalable static data race detection in concurrent programs. Focusing our analysis on Linux device drivers allowed us to identify th...
Vineet Kahlon, Yu Yang, Sriram Sankaranarayanan, A...
ACMICEC
2005
ACM
121views ECommerce» more  ACMICEC 2005»
15 years 6 months ago
A dynamic Bayesian analysis of the drivers of Internet firm survival
We study the impact of a set of industry, firm- and e-commerce-related factors on Internet firm survival. Through the use of one age-based and another calendar time-based Bayesian...
Sudipto Banerjee, Robert J. Kauffman, Bin Wang
134
Voted
PPAM
2005
Springer
15 years 6 months ago
Asymmetric Scheduling and Load Balancing for Real-Time on Linux SMP
The ARTiS system, a real-time extension of the GNU/Linux scheduler dedicated to SMP (Symmetric Multi-Processors) systems is proposed. ARTiS exploits the SMP architecture to guarant...
Éric Piel, Philippe Marquet, Julien Soula, ...
104
Voted
ICCS
2001
Springer
15 years 5 months ago
An Application of the Process Mechanism to a Room Allocation Problem Using the pCG Language
The Sisyphus-I initiative consists of a constraint satisfaction problem in which a group of people in a research environment must be allocated rooms. Numerous constraints are detai...
David Benn, Dan Corbett