Sciweavers

143 search results - page 29 / 29
» Secure Intelligent Agents Based on Formal Description Techni...
Sort
View
AI
2010
Springer
13 years 5 months ago
Kernel functions for case-based planning
Case-based planning can take advantage of former problem-solving experiences by storing in a plan library previously generated plans that can be reused to solve similar planning p...
Ivan Serina
CCS
2010
ACM
13 years 5 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
DRM
2007
Springer
13 years 11 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...