Sciweavers

2623 search results - page 293 / 525
» tools 2010
Sort
View
CLIMA
2010
15 years 1 months ago
Is Computational Complexity a Barrier to Manipulation?
When agents are acting together, they may need a simple mechanism to decide on joint actions. One possibility is to have the agents express their preferences in the form of a ballo...
Toby Walsh
CMS
2010
207views Communications» more  CMS 2010»
15 years 1 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
ACTA
2010
191views more  ACTA 2010»
15 years 29 days ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
84
Voted
ADT
2010
15 years 29 days ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
82
Voted
AUTOMATICA
2010
99views more  AUTOMATICA 2010»
15 years 29 days ago
Continuous trajectory planning of mobile sensors for informative forecasting
This paper addresses planning of continuous paths for mobile sensors to reduce uncertainty in some quantities of interest in the future. The mutual information between the measure...
Han-Lim Choi, Jonathan P. How