Sciweavers

DSN
2011
IEEE
12 years 4 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
KESAMSTA
2011
Springer
12 years 7 months ago
Extending the JADE Agent Behaviour Model with JBehaviourTrees Framework
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do...
Iva Bojic, Tomislav Lipic, Mario Kusek, Gordan Jez...
AGI
2011
12 years 8 months ago
Measuring Agent Intelligence via Hierarchies of Environments
Under Legg’s and Hutter’s formal measure [1], performance in easy environments counts more toward an agent’s intelligence than does performance in difficult environments. An ...
Bill Hibbard
SIGCSE
2008
ACM
153views Education» more  SIGCSE 2008»
13 years 3 months ago
A cross-domain visual learning engine for interactive generation of instructional materials
We present the design and development of a Visual Learning Engine, a tool that can form the basis for interactive development of visually rich teaching and learning modules across...
K. R. Subramanian, T. Cassen
BMCBI
2007
159views more  BMCBI 2007»
13 years 4 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...
ASE
2010
126views more  ASE 2010»
13 years 4 months ago
Generating a checking sequence with a minimum number of reset transitions
Given a finite state machine M, a checking sequence is an input sequence that is guaranteed to lead to a failure if the implementation under test is faulty and has no more states t...
Robert M. Hierons, Hasan Ural
ICVGIP
2004
13 years 5 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
ACSW
2004
13 years 6 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...
IJCAI
2007
13 years 6 months ago
Fault-Model-Based Test Generation for Embedded Software
Testing embedded software systems on the control units of vehicles is a safety-relevant task, and developing the test suites for performing the tests on test benches is time-consu...
Michael Esser, Peter Struss
ASSETS
2008
ACM
13 years 6 months ago
Brain-controlled finite state machine for wheelchair navigation
This proposal is about a brain-controlled electrically powered wheelchair. The system comprises a brain-computer interface based on steady-state visual evoked potentials and a pro...
Amir Teymourian, Thorsten Lüth, Axel Graeser,...