Sciweavers

5401 search results - page 219 / 1081
» Using Versions in GIS
Sort
View
ATAL
2009
Springer
15 years 11 months ago
Decentralised coordination of continuously valued control parameters using the max-sum algorithm
In this paper we address the problem of decentralised coordination for agents that must make coordinated decisions over continuously valued control parameters (as is required in m...
Ruben Stranders, Alessandro Farinelli, Alex Rogers...
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 10 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
ICANN
2005
Springer
15 years 10 months ago
Evolving Modular Fast-Weight Networks for Control
Abstract. In practice, almost all control systems in use today implement some form of linear control. However, there are many tasks for which conventional control engineering metho...
Faustino J. Gomez, Jürgen Schmidhuber
VLDB
1999
ACM
149views Database» more  VLDB 1999»
15 years 8 months ago
The Persistent Cache: Improving OID Indexing in Temporal Object-Oriented Database Systems
In a temporal OODB, an OID index (OIDX) is needed to map from OID to the physical location of the object. In a transaction time temporal OODB, the OIDX should also index the objec...
Kjetil Nørvåg
DIMVA
2010
15 years 5 months ago
HProxy: Client-Side Detection of SSL Stripping Attacks
Abstract. In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new atta...
Nick Nikiforakis, Yves Younan, Wouter Joosen