Sciweavers

1169 search results - page 131 / 234
» Two Ways to Common Knowledge
Sort
View
GLOBECOM
2006
IEEE
15 years 4 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
ICPPW
2006
IEEE
15 years 4 months ago
Dynamic Algorithm Selection in Parallel GAMESS Calculations
Applications augmented with adaptive capabilities are becoming common in parallel computing environments which share resources such as main memory, network, or disk I/O. For large...
Nurzhan Ustemirov, Masha Sosonkina, Mark S. Gordon...
IPSN
2005
Springer
15 years 3 months ago
Perpetual environmentally powered sensor networks
— Environmental energy is an attractive power source for low power wireless sensor networks. We present Prometheus, a system that intelligently manages energy transfer for perpet...
Xiaofan Jiang, Joseph Polastre, David E. Culler
ECAI
2004
Springer
15 years 3 months ago
A Formal Tutoring Process Model for Intelligent Tutoring Systems
The combination Computer Based Training systems with Artificial Intelligence and Cognitive Science has led to the development of Intelligent Tutoring Systems nearly 30 years ago. ...
Alke Martens, Adelinde Uhrmacher
ASIACRYPT
2003
Springer
15 years 3 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu