Sciweavers

1731 search results - page 308 / 347
» Adapting Populations of Agents
Sort
View
AAAI
2012
13 years 2 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
AAAI
2012
13 years 2 months ago
Advances in Lifted Importance Sampling
We consider lifted importance sampling (LIS), a previously proposed approximate inference algorithm for statistical relational learning (SRL) models. LIS achieves substantial vari...
Vibhav Gogate, Abhay Kumar Jha, Deepak Venugopal
AAAI
2012
13 years 2 months ago
Double-Bit Quantization for Hashing
Hashing, which tries to learn similarity-preserving binary codes for data representation, has been widely used for efficient nearest neighbor search in massive databases due to i...
Weihao Kong, Wu-Jun Li
AAAI
2012
13 years 2 months ago
Discovering Constraints for Inductive Process Modeling
Scientists use two forms of knowledge in the construction of explanatory models: generalized entities and processes that relate them; and constraints that specify acceptable combi...
Ljupco Todorovski, Will Bridewell, Pat Langley
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 6 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...