Sciweavers

119 search results - page 23 / 24
» Can We Get Better Assessment From A Tutoring System Compared...
Sort
View
USS
2008
13 years 7 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
IEICET
2007
83views more  IEICET 2007»
13 years 5 months ago
A MFCC-Based CELP Speech Coder for Server-Based Speech Recognition in Network Environments
Existing standard speech coders can provide speech communication of high quality while they degrade the performance of speech recognition systems that use the reconstructed speech...
Jae Sam Yoon, Gil Ho Lee, Hong Kook Kim
HICSS
2010
IEEE
193views Biometrics» more  HICSS 2010»
14 years 4 days ago
The Topological and Electrical Structure of Power Grids
Numerous recent papers have found important relationships between network structure and risks within networks. These results indicate that network structure can dramatically affec...
Paul Hines, Seth Blumsack, E. Cotilla Sanchez, C. ...
ATAL
2009
Springer
13 years 12 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...
ICMLA
2009
13 years 3 months ago
Regularizing the Local Similarity Discriminant Analysis Classifier
Abstract--We investigate parameter-based and distributionbased approaches to regularizing the generative, similarity-based classifier called local similarity discriminant analysis ...
Luca Cazzanti, Maya R. Gupta