Sciweavers

24 search results - page 3 / 5
» An Empirical Investigation of the Adversarial Activity Model
Sort
View
IEEESCC
2005
IEEE
13 years 10 months ago
Knowledge as a Service and Knowledge Breaching
In this paper, we introduce and explore a new computing paradigm we call knowledge as a service, in which a knowledge service provider, via its knowledge server, answers queries p...
Shouhuai Xu, Weining Zhang
IEAAIE
2010
Springer
13 years 3 months ago
Predicting the Development of Juvenile Delinquency by Simulation
A large number of delinquent activities are performed by adolescents and only occur during this period in their lives. One of the main factors that influence this behaviour is soci...
Tibor Bosse, Charlotte Gerritsen, Michel C. A. Kle...
FLAIRS
2009
13 years 2 months ago
Beating the Defense: Using Plan Recognition to Inform Learning Agents
In this paper, we investigate the hypothesis that plan recognition can significantly improve the performance of a casebased reinforcement learner in an adversarial action selectio...
Matthew Molineaux, David W. Aha, Gita Sukthankar
ESEM
2007
ACM
13 years 6 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...
ESORICS
2006
Springer
13 years 8 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang