نتایج جستجو برای: antivirus update agent system

تعداد نتایج: 2473140  

Journal: :CoRR 2018
Hans van Ditmarsch Wiebe van der Hoek Barteld Kooi Louwe B. Kuijer

In this contribution we present arbitrary arrow update model logic (AAUML). This is a dynamic epistemic logic or update logic. In update logics, static/basic modalities are interpreted on a given relational model whereas dynamic/update modalities induce transformations (updates) of relational models. In AAUML the update modalities formalize the execution of arrow update models, and there is als...

2012
Lu WANG Zhiliang WANG

Mutual cooperation in Multi-Agent Systems is an important means to implement complex applications. The static task allocation is one of the key issues in agent cooperation mechanism. The latency of the network infrastructure, dynamic topology and node heterogeneity are important features of the agent system, and they bring new challenges to the static task allocation in multi-agent environment....

Journal: :Symmetry 2017
Igor Forain Robson de Oliveira Albuquerque Ana Lucila Sandoval Orozco L. Javier García-Villalba Tai-Hoon Kim

Increasingly sophisticated antivirus (AV) software and the growing amount and complexity of malware demand more processing power from personal computers, specifically from the central processor unit (CPU). This paper conducted performance tests with Clam AntiVirus (ClamAV) and improved its performance through parallel processing on multiple cores using the Open Multi-Processing (OpenMP) library...

2004
Mehrnoosh Sadrzadeh

Abramsky and Hintikka style games can be seen as representatives of the two main branches of game semantics. They both model interaction but each in a different manner. Hintikka games provide models of propositional interaction in terms of classical logic connectives such as ∨, ∧, →, and ¬. Abramsky games, on the other hand, model the interaction between programs that run in different parallel ...

Journal: :CoRR 2017
Jichao Bi Luxing Yang Xiaofan Yang Yingbo Wu Yuan Yan Tang

This paper addressed the issue of estimating the damage caused by a computer virus. First, an individual-level delayed SIR model capturing the spreading process of a digital virus is derived. Second, the damage inflicted by the virus is modeled as the sum of the economic losses and the cost for developing the antivirus. Next, the impact of different factors, including the delay and the network ...

2006
Pieter Bos Dennis Reidsma Zsófia Ruttkay Anton Nijholt

Abstract. This paper presents a virtual embodied agent that can conduct musicians in a live performance. The virtual conductor conducts music specified by a MIDI file and uses input from a microphone to react to the tempo of the musicians. The current implementation of the virtual conductor can interact with musicians, leading and following them while they are playing music. Different time sign...

2002
Yiyu Yao Howard J. Hamilton Xuewei Wang

Some challenges for Website designers are to provide correct and useful information to individual users with different backgrounds and interests, as well as to increase user satisfaction. Intelligent Web agents offer a potential solution to meet such challenges. A Web agent collects information, discovers knowledge through Web mining and users’ behavior analysis, and applies the discovered know...

2003
Jian Li Guoyin Zhang Guochang Gu

Network Attack Resistant is a highlighted topic of network security research in recent years, it offers real-time protection to systems and is considered as the second important method in network security defense beside firewall. But the existing intrusion detection system architectures have a number of problems that limit their scalability and efficiency. Firstly, this paper introduces the cla...

This paper presents an online two-stage Q-learning based multi-agent (MA) controller for load frequency control (LFC) in an interconnected multi-area multi-source power system integrated with distributed energy resources (DERs). The proposed control strategy consists of two stages. The first stage is employed a PID controller which its parameters are designed using sine cosine optimization (SCO...

2002
Christopher BREWSTER

Knowledge maintenance is a major challenge for both knowledge management and the Semantic Web. Operating over the Semantic Web, there will be a network of collaborating agents, each with their own ontologies or knowledge bases. Change in the knowledge state of one agent may need to be propagated across a number of agents and their associated ontologies. The challenge is to decide how to propaga...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید